The threat actor claims the stealer can also perform process grabbing and file grabbing operations, making it a versatile tool for data theft operations. This malware-as-a-service (MaaS) offering represents the latest evolution in information stealer technology, combining sophisticated data exfiltration capabilities with a user-friendly administrative interface. The malware features a DLL-free stub architecture, weighing approximately 700KB, which makes it more difficult to detect by traditional antivirus solutions that rely on dynamic link library (DLL) injection detection methods. However, the professional presentation of the login interface and comprehensive administrative panel suggests significant development investment, indicating this may be a serious threat rather than a scam operation. The forum advertisement emphasizes that users are responsible for any detection or force majeure events, indicating that malware authors are attempting to limit their liability. Steals browser data, passwords, crypto wallets, Discord accounts, and performs file/process grabbing. This pricing strategy targets both novice cybercriminals and experienced threat actors seeking reliable data exfiltration tools. This approach allows malware operators to maintain operational security (OPSEC) while distributing infrastructure burden to customers. The administrative panel reveals extensive browser support, including compatibility with over 70 browser extensions. The subscription model ensures recurring revenue for malware authors while providing continuous updates and support to customers. Stealer samples and update detection signatures to protect against this emerging threat. Stealer" marketed for $120/month by threat actor "koneko" on underground forums. Stealer is written in C++, a programming language choice that suggests developers prioritized performance and low-level system access. C++ coded, DLL-free (~700KB), supports 70+ browser extensions, requires self-hosted proxy servers.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 04 Jul 2025 08:35:15 +0000