Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 385 Vote(s) - 3.42 Average
  • 1
  • 2
  • 3
  • 4
  • 5
How hackers receive their stolen information?

#1
I wonder how do they collect information they stole from someone's computer (e.g emails, credit cards...), without user being able to know where it went?

Sending emails or uploading their information somewhere may be seen by the victim using tools for sniffing, so it's probably not something attacker would do.

Any ideas?
Reply

#2
There are tons of ways to get information from someone's computer. Keylogger is the first idea that comes to mind.
Reply

#3
Quote:(03-13-2019, 12:29 AM)Cyb3rNuX Wrote:

[To see links please register here]

Quote: (03-12-2019, 11:26 PM)Nyx Wrote:

[To see links please register here]

There are tons of ways to get information from someone's computer. Keylogger is the first idea that comes to mind.

It's not what I asked. I'm curious about how they receive information they stole (e.g keys captured with keylogger etc).

Dump the keylogged activities to a random email account.
Reply

#4
Quote:(03-12-2019, 11:26 PM)Nyx Wrote:

[To see links please register here]

There are tons of ways to get information from someone's computer. Keylogger is the first idea that comes to mind.

It's not what I asked. I'm curious about how they receive information they stole (e.g keys captured with keylogger etc).
Reply

#5
Rating is my thought but, after you've dug hard enough and, extracted that information then, many ways of dumping that information.
Forums, Pastebin sites(most don't allow) & etc.

Of course, if you tried to search that email address, not results will show. The only way for the victim to realize is, for someone to make the first approach.
Reply

#6
Quote:(03-13-2019, 12:29 AM)Cyb3rNuX Wrote:

[To see links please register here]

I'm curious about how they receive information they stole (e.g keys captured with keylogger etc).

Depending on the options In the keylogger/RAT's builder, the logs are sent to a nominated email address or via FTP.

You can set the Interval of the logs to be sent- example, every 15-30 minutes. I usually opt for every 60 minutes, hence my Inbox Is not flooded with log files.
Reply

#7
Quote:(03-13-2019, 03:00 AM)mothered Wrote:

[To see links please register here]

Depending on the options In the keylogger/RAT's builder, the logs are sent to a nominated email address or via FTP.

You can set the Interval of the logs to be sent- example, every 15-30 minutes. I usually opt for every 60 minutes, hence my Inbox Is not flooded with log files.

Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?
Reply

#8
Quote:(03-13-2019, 12:44 AM)Nyx Wrote:

[To see links please register here]

Dump the keylogged activities to a random email account.

I was already thinking about that - getting random email and sending collected information to myself. Really good idea, appreciate it.

Quote:(03-13-2019, 01:43 AM)MimiE Wrote:

[To see links please register here]

Rating is my thought but, after you've dug hard enough and, extracted that information then, many ways of dumping that information.
Forums, Pastebin sites(most don't allow) & etc.

Of course, if you tried to search that email address, not results will show. The only way for the victim to realize is, for someone to make the first approach.

I like the pastebin idea as there are unlisted/private options for pastes I can upload. Thank you!
Reply

#9
Quote:(03-13-2019, 01:30 PM)Cyb3rNuX Wrote:

[To see links please register here]

Quote: (03-13-2019, 03:00 AM)mothered Wrote:

[To see links please register here]

Depending on the options In the keylogger/RAT's builder, the logs are sent to a nominated email address or via FTP.

You can set the Interval of the logs to be sent- example, every 15-30 minutes. I usually opt for every 60 minutes, hence my Inbox Is not flooded with log files.

Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?

Not at all.

In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.
Reply

#10
Quote:(03-13-2019, 02:36 PM)mothered Wrote:

[To see links please register here]

Quote: (03-13-2019, 01:30 PM)Cyb3rNuX Wrote:

[To see links please register here]

Quote: (03-13-2019, 03:00 AM)mothered Wrote:

[To see links please register here]

Depending on the options In the keylogger/RAT's builder, the logs are sent to a nominated email address or via FTP.

You can set the Interval of the logs to be sent- example, every 15-30 minutes. I usually opt for every 60 minutes, hence my Inbox Is not flooded with log files.

Isn't that risky, as anyone can see source code and FTP information or attacker's email in it?

Not at all.

In terms of the email, the logs are sent In the form of a text file, directly to a random email account that was created using fictitious details whilst connected to a dedicated device with unidentifiable details, hooked onto a neighbor's AP using a VPN- It's server located on the other side of the globe. MAC address Is also spoofed. No risk whatsoever.

Yep this is the answer. So long as you make sure none of your own information is being passed on while creating the email account you''ll likely be safe.

While connected to a VPN and connected to internet (that isn't your own) then you'd sign up for an email address at something like ProtonMail (based in Switzerland, any non 14 Eyes email provider would work though) under a completely anonymous handle (ex: [email protected]). As long as you don't use any personal information that could be used to identify you then it'd be incredibly hard for anyone to trace the account back to you.

And if you're using a FUD logger that is obfuscated they're probably not going to be able to even break it open to obtain the email address in the first case. They'd need to be fairly closely watching their packet sniffer to catch when the information is transferred since like @mothered mentioned he sets his to only relay information once an hour.
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through