Researchers Discover Dozens Samples of Information Stealer ‘Stealc’ in the Wild

Cyber Security

Products You May Like

Feb 21, 2023Ravie LakshmananCyber Threat Intelligence

A new information stealer called Stealc that’s being advertised on the dark web could emerge as a worthy competitor to other malware of its ilk.

“The threat actor presents Stealc as a fully featured and ready-to-use stealer, whose development relied on Vidar, Raccoon, Mars, and RedLine stealers,” SEKOIA said in a Monday report.

The French cybersecurity company said it discovered more than 40 Stealc samples distributed in the wild and 35 active command-and-control (C2) servers, suggesting that the malware is already gaining traction among criminal groups.

Stealc, first marketed by an actor named Plymouth on the XSS and BHF Russian-speaking underground forums on January 9, 2023, is written in C and comes with capabilities to steal data from web browsers, crypto wallets, email clients, and messaging apps.

The malware-as-a-service (MaaS) also boasts of a “customizable” file grabber that allows its buyers to tailor the module to siphon files of interest. It further implements loader capabilities to deploy additional payloads.

SEKOIA assessed with “high confidence that its alleged developer quickly established itself as a reliable threat actor, and its malware gained the trust of cybercriminals dealing with infostealers.”

Information Stealer

Among the distribution vectors used to deliver Stealc are YouTube videos posted from compromised accounts that link to a website peddling cracked software (“rcc-software[.]com”).

This also indicates that users searching for ways to install pirated software on YouTube are a target, mirroring the same tactic adopted by another infostealer dubbed Aurora.

“Since customers of the Stealc MaaS own a build of its administration panel to host the stealer C2 server and generate stealer samples themselves, it is likely that the build will leak into the underground communities in the medium term,” the company added.

According to antivirus vendor Avast, FormBook, Agent Tesla, RedLine, LokiBot, Raccoon, Snake Keylogger, and Arkei (along with its fork Vidar) accounted for the most prevalent stealer malware strains during Q4 2022.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Products You May Like

Articles You May Like

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
Tech stocks in Asia fall amid broad declines in the region after Nvidia results
SpaceX Polaris Dawn Mission: Overview, Significance and Reason Behind the Delay
Amazon checkout process hits technical snag during Labor Day sale
NCLT Approves Merger of Viacom 18, Star India After CCI Nod

Leave a Reply

Your email address will not be published. Required fields are marked *