


Surveillance malware covers a broad range of capabilities, including: In this post, Unit 42 examines various trends in a malware threat set within the surveillance malware category: Predator Pain and its latest derivative, HawkEye. There are a number of threats that endanger the critical secrecy of credentials, including poor operational security practices, social engineering, man-in-the-middle attacks, password hash dumping and cracking, and surveillance malware.

Unless specifically mitigated, this theft often allows an unauthorized actor to masquerade as the victim, either achieving immediate gains or creating a platform from which progressive attack campaigns may launch. One of the most damaging activities an actor pursues is the theft of authentication information, whether it applies to business or personal accounts. Malicious actors employ a range of tools to achieve their objectives.
