Supposedly shut down last November, the Stealer-as-a-Service nevertheless remains in active distribution through unknown sources

Distributed through phishing websites and malicious code repositories disguised as popular software, the malware had operated undetected for months. Its sophisticated functionality includes:

  • Data theft: It targets browsers, cryptocurrency wallets, and Two-Factor Authentication (2FA) extensions to steal credentials, system details, and macOS passwords.
  • Deception: Uses convincing system pop-ups to trick users into providing sensitive information.
  • Detection evasion: Employs advanced anti-analysis techniques to avoid antivirus tools.
  • Data exfiltration: Sends stolen data to command-and-control servers via encrypted files.

Businesses and users need to adopt proactive cybersecurity measures, including:

  • Advanced threat detection tools to combat evolving malware
  • Awareness training to identify phishing attempts and suspicious activity
  • Regular updates to maintain robust defenses against emerging threats