Raccoon is delivered in multiple ways, for example through exploit kits, phishing attacks, and bundled malware.
1. Usually hosted on websites, exploit kits profile victims for any potential browser-based weaknesses before sending them to the relevant exploit kit to take advantage of them. While a victim is online, exploit kits immediately reap the benefits of flaws on their computer.
2. Phishing is a social engineering attack where a user is tricked into executing malicious content. In phishing attacks, Microsoft Office documents with harmful macros are embedded in fraudulent emails distributed to potential victims.
3. Bundled malware is malware bundled with legitimate software downloaded from "shady" websites with the primary payload of the info stealer to infect unsuspecting users.
During installation, the bundled malware is frequently concealed from the user or is made installable through social engineering methods...
Details are available at: https://www.vevioz.com/read-blog/68768
#raccoonstealer