A new Golang-based information-stealing malware dubbed Titan Stealer is advertised by cybercriminals through their own Telegram channel.
“The thief is able to steal a variety of information from infected Windows computers, including credentials from browsers and crypto wallets, FTP client data, screenshots, system information and user files,” according to a recent report by security researchers at Uptycs.
The authors of Titan offer their creation in the form of a constructor that allows clients to customize the malware binary for specific functions and the type of information that needs to be extracted from the victim's computer.
Once activated, the malware uses a technique known as Process Hollowing to inject a malicious payload into the memory of the AppLaunch.exe process, which is a Microsoft .NET ClickOnce launcher.
Titan Stealer can steal data from most modern browsers such as Google Chrome, Mozilla Firefox, Microsoft Edge, Yandex Browser, Opera, Brave, Vivaldi, 7 Star Browser, Iridium Browser and others. And also from Armory, Atomic, Bytecoin, Coinomi, Edge Wallet, Ethereum, Exodus, Guarda, Jaxx Liberty and Zcash crypto wallets.
Titan is also capable of collecting a list of installed apps on a hacked host and capturing data related to the Telegram desktop app.
The collected information is subsequently transmitted to a remote server under the attacker's control in the form of a Base64 encoded archive file. In addition, the malware comes with a web interface that allows attackers to access stolen data.
The exact method of malware distribution is still unclear, but traditionally, attackers use a number of methods such as phishing, malicious ads, and hacked software.
“One of the main reasons attackers want to use Golang in their malware to steal information is that the language allows them to easily create cross-platform malware that can run on multiple operating systems at once, such as Windows, Linux, and macOS. In addition, Go-compiled binaries are small in size, making them difficult for security software to detect,” Cyble said in a report.
The development comes just over two months after SEKOIA detailed another Go-based malware called Aurora Stealer, which is used by several criminal groups in their malware campaigns.