- “Ducktail” Hackers Target Facebook - September 28, 2023
- Okta Breach: Super Admin Hack - September 24, 2023
- Rackspace: $10.8M Cloud Shift - September 23, 2023
Zscaler’s latest research unveils a lurking digital threat named “Statc Stealer” designed to infiltrate Windows devices. Its primary objective? Mining an array of personal and payment details directly from the unsuspecting victim’s browser.
This malware boasts a plethora of data extraction capabilities, catapulting it to a heightened threat level in the cybersecurity landscape. Its prowess extends to extracting information such as passwords, login credentials, cookies, cryptocurrency wallet details, and a myriad of web data from a range of browsers. Intriguingly, data intercepts from platforms like Telegram and other messenger services, which likely operate via browser-based web versions, have also been documented.
Written in C++, the modus operandi of this malware is both deceptive and insidious. Users are lured into clicking what appears to be a benign advertisement, leading them to inadvertently download and run an executable. This initial action stealthily deploys a downloader, setting the stage for the main malware’s installation.
Statc Stealer is intricately designed to maneuver around sandboxes and code analysis tools. It also establishes a secure connection to its command-and-control (C2) server using HTTPS protocols, facilitating command receipt and dispatch of pilfered data.
Its hunting grounds encompass major browsers, including Chrome, Edge, Firefox, Brave, Opera, and Yandex.Browser. The very ability to mine data directly from these platforms makes Statc Stealer a significant player in potential identity and financial fraud schemes.
Industry experts are sounding the alarm, underscoring the burgeoning threat of browser-focused malware in the digital realm. Malware akin to Statc Stealer has the potential to compromise the sensitive information of millions worldwide, reinforcing the urgency for robust cyber defenses.