It seems that cryptocurrency owners have another threat to keep on their radars besides scammers and cryptojacking. It’s called Raccoon malware and it’s even peskier than the brown-and-white critters causing havoc in your backyard.

A new threat on the horizon – Raccoon malware

According to tech news site ZDNet, Raccoon is growing in popularity among cybercriminals for its wide-reaching capabilities. It isn’t the cheapest option available to opportune hackers but it gives them the ability to target as many as 60 applications–including a massive range of browsers:

“Every browser you can think of is a target of the popular malware.”

The Raccoon “infostealer” is particularly adept at stealing data from infected devices. It has gained traction thanks to a following in underground communities where it has been extensively marketed for its easy-to-use backend and wide range of capabilities.

Raccoon malware goes for $200 a month, but it can reap a far greater return for its purchasers. It’s also incredibly sophisticated as far as malware is concerned, offering a subscription model with tech support, updates, and bug fixes. This makes it a “worthwhile investment” for bad actors of all stripes.

Cybersecurity analysts Cyberark noted that unlike most run-of-the-mill info stealers, Raccoon malware uses a variety of techniques to steal information. Its C++ malware can swipe data from at least 35 different browsers.

Raccoon is generally delivered to its victims through phishing campaigns and fraudulent emails with MS Office documents attached containing the malicious code. It can also spread to your machine through what is known as “exploit kits.” This is where you are profiled for any browser-based vulnerabilities and redirected to a site where the exploit kit is lying in wait.

Not just your data but your crypto at risk

While Raccoon can steal online credentials and financial information, here’s where it gets really scary. It can scan your device for PC data, such as its operating system, versions, and any installed applications, including cryptocurrency wallets, and browser information with your auto-filled passwords and history logs.

Among the browsers, the Raccoon malware targets are Firefox, Microsft Edge, and Google Chrome. But if you navigate on a privacy browser like Opera, you’re not in the clear either. Raccoon malware works on many of them as well.

It is also programmed to target certain cryptocurrency wallets including Exodus, Jaxx, Monero, Electrum, Ethereum, and Bither wallets. It scans for their application folders in order to pilfer their credentials.

New threats in the shape of Raccoon malware are making it easy for anyone to get in on cybercrime. Alas, Malware-as-a-Service (MaaS) really is a thing and you should be very worried.

How to stay safe

As always, the best way to keep your cryptocurrency safe is by using a hard wallet or paper wallet. It’s also important to regularly change passwords and use different passwords across websites and online services.