New Germlin Stealer Advertised on Hacker Forums Steals Credit Card Data & Login Credentials - Cyber Security News

For credit card data theft, Gremlin Stealer employs specialized functions that target stored payment information across multiple browsers. First spotted being advertised on underground forums and Telegram channels, Gremlin Stealer represents a concerning development in the information theft landscape as it combines multiple stealing capabilities in a single package. Once collected, this sensitive financial information is packaged with other stolen data and transmitted to the attacker’s server via an HTTP POST request, which shows the network traffic capture of stolen data being uploaded. The malware extracts cookies, saved passwords, autofill data, and perhaps most concerning, stored credit card information from victim machines. This sophisticated malware targets sensitive information including browser data, cryptocurrency wallets, and various login credentials. Customers protected by advanced security solutions like those from Palo Alto Networks can benefit from behavioral detection capabilities that identify and block such information-stealing malware before it can exfiltrate sensitive data. After infecting a system, Gremlin Stealer creates dedicated storage locations within the LOCAL_APP_DATA folder to temporarily store stolen information as plain text files before compressing everything into a ZIP archive. The malware operates by harvesting data from multiple sources on infected Windows machines, including popular web browsers, cryptocurrency wallets, messaging applications, and VPN services. What makes Gremlin Stealer particularly dangerous is its ability to bypass Chrome’s cookie V20 protection – a security feature specifically designed to prevent credential theft. The most concerning aspect of Gremlin Stealer is its sophisticated method for extracting sensitive financial information. This function establishes a connection and sends the message “{\”id\”: 1, \”method\”: \”Network.getAllCookies\”}” to retrieve all stored cookies, which are then written to a text file containing domain, name, value, path, and expiration information. Cybersecurity researchers have identified a new information-stealing malware called Gremlin Stealer that has been active in the wild since March 2025. Unit 42, the company’s threat intelligence team, has been tracking Gremlin Stealer since March 2025 and has conducted a comprehensive technical analysis of its functions and capabilities. The targeted theft of cryptocurrency wallet data also points to financial motivation behind the malware’s distribution, potentially leading to direct monetary losses for affected users. Gremlin Stealer login page, demonstrates how attackers can conveniently manage and download stolen information. It checks for an extensive list of Chromium and Gecko-based browsers, searches for specific cryptocurrency wallet files, and extracts configuration data from various FTP clients and VPN services. This comprehensive approach ensures that virtually no valuable credential or financial information escapes theft once a system is compromised.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 30 Apr 2025 11:40:11 +0000


Cyber News related to New Germlin Stealer Advertised on Hacker Forums Steals Credit Card Data & Login Credentials - Cyber Security News

New Germlin Stealer Advertised on Hacker Forums Steals Credit Card Data & Login Credentials - Cyber Security News - For credit card data theft, Gremlin Stealer employs specialized functions that target stored payment information across multiple browsers. First spotted being advertised on underground forums and Telegram channels, Gremlin Stealer represents a ...
4 hours ago Cybersecuritynews.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
6 months ago Aws.amazon.com
Preventing Credit Card Fraud with PoS Malware: How Prilex Blocks Contactless Payments - New versions of the Prilex point-of-sale malware can block secure, NFC-enabled contactless credit card transactions, forcing consumers to insert credit cards that are then stolen by the malware. On a payment terminal, contactless transactions use NFC ...
2 years ago Bleepingcomputer.com
New Android Malware 'Salvador Stealer' That Phish & Steals Your Banking Details & OTPs - Cybersecurity researchers have discovered a sophisticated new Android malware called “Salvador Stealer” that targets banking credentials and one-time passwords (OTPs) through an elaborate phishing scheme. Once active, Salvador Stealer ...
4 weeks ago Cybersecuritynews.com
CVE-2021-36845 - Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions < 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. ...
3 years ago
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
2 weeks ago Cybersecuritynews.com
Is Your Online Store Hacked in a Carding Attack? - Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using carding attacks as we gear up for the holiday season shopping. Online companies selling products or services are struggling with the growing ...
1 year ago Cybersecuritynews.com
Ransomware attack on Patelco Credit Union causes confusion ahead of holiday weekend - One of the largest credit unions on the West Coast continues to struggle with its operations following a ransomware attack that began on Saturday. Patelco Credit Union - one of the nation's oldest credit unions with more than $9 billion in assets - ...
9 months ago Therecord.media
Vidar Stealer With New Deception Technique to Steal Browser Cookies & Stored Credentials - Vidar Stealer, an information-stealing malware first identified in 2018, has evolved with a sophisticated new deception technique targeting cybersecurity professionals and system administrators. G Data security researchers identified an unusual Vidar ...
3 weeks ago Cybersecuritynews.com
New Malware Attacking Magic Enthusiasts to Steal Login Credentials - Dubbed “AbracadabraStealer,” this malware steals login credentials from magic forums, online shops, and streaming platforms where enthusiasts store payment information. Stolen data is used for fraudulent purchases, unauthorized access to ...
3 weeks ago Cybersecuritynews.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
RedLine Stealer Malware Deployed Via ScrubCrypt Evasion Tool - A new version of the ScrubCrypt obfuscation tool is being used to target organizations with the RedLine Stealer malware, fraud sensor network Human Security has warned. Human's Satori Threat Intelligence Team said it has uncovered the new build of ...
1 year ago Infosecurity-magazine.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
4 hours ago Cybersecuritynews.com Inception
Halting Hackers on the Holidays 2023 - As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive increase in shopping online for the Christmas season, we count the breaches and total personally identifiable information records lost ...
1 year ago Cyberdefensemagazine.com
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets - Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control infrastructure before, in some cases, self-terminating. This article will ...
1 year ago Bleepingcomputer.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
6 months ago Cyberdefensemagazine.com Akira
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Researchers Uncovered Hacking Tools and Techniques Discussed on Russian-Speaking Hacking Forums - Trend Micro researchers noted that these Russian-speaking forums operate with a unique hierarchical structure where established members provide mentorship and technical guidance to newcomers, creating a self-perpetuating ecosystem of cybercriminal ...
2 weeks ago Cybersecuritynews.com
Beware of Weaponized Amazon Gift Cards That Steals Microsoft Credentials - This new attack vector disguises malicious links within seemingly legitimate Amazon gift card emails, creating a perfect social engineering trap that leverages both financial incentives and corporate trust. Upon clicking the “View My eGift ...
1 week ago Cybersecuritynews.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
TROX Stealer Exfiltrate Sensitive Data Including Stored Credit Cards & Browser Credentials - A newly identified malware strain known as TROX Stealer has emerged as a significant threat to consumer data security, leveraging psychological manipulation and technical sophistication to exfiltrate sensitive information. First observed in December ...
2 weeks ago Cybersecuritynews.com
Prilex PoS Malware Blocks NFC Transactions to Steal Credit Card Data - The point-of-sale malware named Prilex has been modified to block contactless transactions in an effort to force users to insert their credit cards into terminals and steal their information. Initially detailed in 2017, Prilex has evolved from ...
2 years ago Securityweek.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
2 years ago Securityweek.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)