FTCode Steals Passwords and Credentials

ftcode-ransomewareIn this article we echo a new threat that puts the passwords we have stored in the browser at risk. This is the FTCode ransomware , which is not only capable of encrypting systems, but now can also steal user credentials. A problem that worsens and puts the privacy and security of the victims at risk. We will explain what it is and we will also give some advice to prevent this threat from infecting us.

FTCode, the ransomware that now steals passwords

FTCode is one of the many ransomware that can compromise our system. As we know, these types of threats are intended to encrypt systems . It is capable of making our files completely inaccessible. In return they ask for an economic rescue.

Now FTCode has been updated and is even more dangerous. It no longer acts only as a traditional ransomware, but now it is also capable of stealing passwords. It does so much of the email as all those passwords that are registered in the browser. This logically puts our privacy and security at risk.

It is a strain of ransomware based on PowerShell . It is not something new, since FTCode was discovered in 2013. However, over time it has improved its attacks and is more dangerous. Being based on PowerShell means that you can encrypt systems without having to download additional components.

But now, as we have indicated, FTCode is able to steal credentials stored in browsers. It affects some of the most popular and used such as Google Chrome, Mozilla Firefox or Internet Explorer. It can also attack email clients such as Mozilla Thunderbird or Microsoft Outlook.

Of course, not in all cases acts the same. To steal the credentials of Internet Explorer and Microsoft Outlook directly access the registry keys. Instead, to steal passwords from Chrome, Firefox or Thunderbird, it goes to the folders where applications store those credentials.

Generally FTCode arrives through an email. It can be hidden in attachments in Word documents, for example.

Robo de contraseñas por ransomware

How to avoid being victims of FTCode

Luckily, avoiding being victims of FTCode is simple. As we have said, it usually comes through a malicious file sent by email. Therefore it will be essential to protect ourselves in this regard. It is vital that we have a lot of eye with the emails we receive and never open or download attachments that could be dangerous.

It is also essential to have security tools . A good antivirus can prevent the entry of threats and analyze the system. It will be necessary not to compromise our equipment. Something we must apply regardless of the system or platform we are using.

Finally, it will also be necessary to have the equipment updated correctly. Sometimes vulnerabilities arise that can be exploited by hackers. By installing the latest security patches and updates we can protect ourselves.