BTC $63060.4292
ETH $3124.6408
BNB $593.8008
SOL $136.2835
stETH $3115.4177
XRP $0.5155
DOGE $0.1451
TON $5.2447
ADA $0.4546
AVAX $34.0863
wstETH $3637.9458
TRX $0.1206
WBTC $63071.9741
WETH $3123.7782
DOT $6.6636
BCH $472.0051
LINK $14.1351
MATIC $0.6954
UNI $7.6897
LTC $86.4220
ICP $12.9296
DAI $0.9993
CAKE $2.7178
NEAR $7.0616
RNDR $7.9244
IMX $2.0517
FDUSD $1.0016
ETC $26.6754
HBAR $0.1087
STX $2.5130
MNT $1.0796
FIL $5.7904
OKB $52.0204
PEPE $0.0000
TAO $422.6475
VET $0.0386
ATOM $8.2111
WIF $2.6905
MKR $2898.6865
KAS $0.1125
GRT $0.2612
USDE $0.9992
FET $2.1245
INJ $25.4763
THETA $2.2720
XLM $0.1124
XMR $120.3744
BTC $63060.4292
ETH $3124.6408
BNB $593.8008
SOL $136.2835
stETH $3115.4177
XRP $0.5155
DOGE $0.1451
TON $5.2447
ADA $0.4546
AVAX $34.0863
wstETH $3637.9458
TRX $0.1206
WBTC $63071.9741
WETH $3123.7782
DOT $6.6636
BCH $472.0051
LINK $14.1351
MATIC $0.6954
UNI $7.6897
LTC $86.4220
ICP $12.9296
DAI $0.9993
CAKE $2.7178
NEAR $7.0616
RNDR $7.9244
IMX $2.0517
FDUSD $1.0016
ETC $26.6754
HBAR $0.1087
STX $2.5130
MNT $1.0796
FIL $5.7904
OKB $52.0204
PEPE $0.0000
TAO $422.6475
VET $0.0386
ATOM $8.2111
WIF $2.6905
MKR $2898.6865
KAS $0.1125
GRT $0.2612
USDE $0.9992
FET $2.1245
INJ $25.4763
THETA $2.2720
XLM $0.1124
XMR $120.3744
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New Stealc malware provides a wide range of data theft capabilities

    Infostealer is actively advertised by cybercriminals, supporting 23 browsers, 70 web plugins and 15 crypto wallets.

    There is a new infostealer on the darknet called Stealc that is gaining traction thanks to its aggressive promotion of data theft capabilities and similarities to Vidar, Raccoon, Mars and Redline malware.

    Security researchers from cyber threat detection company SEKOIA identified a new strain of malware in January of this year, and its activity peaked in February.

    Stealc was advertised on hacker forums by a Russian-speaking user under the nickname "Plymouth". The hacker described the broad capabilities of the program for stealing data, and also noted the easy-to-use administration panel.

     

    In addition to the usual targeting of web browser data, extensions and cryptocurrency wallets, Stealc can also be configured to target any types of user files that an operator wishes to steal, according to Plymouth. The author openly stated that the development of Stealc used the developments of the popular malware Vidar, Raccoon, Mars and Redline. The program was also promoted in closed Telegram channels with the opportunity to try out test samples before buying.

    The researchers found one thing in common that shares Stealc with the aforementioned Vidar, Raccoon, Mars and Redline. They all load legitimate third-party ".dll" libraries (eg sqlite3.dll, nss3.dll) to steal user files.

    SEKOIA researchers found more than 40 active Stealc C2 servers and several dozen instances in the wild (ITW). This indicates that the new malware has attracted considerable interest from the cybercriminal community.

    When deployed, the malware deobfuscates its strings and performs anti-analytics checks to make sure it is not running in a virtualized or sandboxed environment. It then dynamically loads the WinAPI functions and initiates communication with the C2 server by sending the victim's hardware ID and assembly name, receiving the desired configuration in response.

    After that, Stealc collects data from all target browsers, extensions and applications, starts capturing user files, and then uploads them to the C2 server. Once this stage is complete, the malware deletes itself and the DLLs it downloaded from the device to erase any traces of the infection.

    One of the distribution methods that researchers have observed is phishing websites that offer potential victims to download hacked software. Of course, Stealc malware was built into this software.

    SEKOIA also shared a large set of indicators of compromise that antivirus companies can use to add malware to their databases.

    Given the way malware is being distributed, users are advised to avoid installing pirated software and only download any products from official websites.

    Author DeepWeb
    "Noble" HardBit ransomware group cares about the well-being of its victims
    The most powerful DDoS attack ever recorded

    Comments 0

    Add comment