Saturday, April 12, 2025
HomeCyber Security NewsNew Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

New Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

Published on

SIEM as a Service

Follow Us on Google News

Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection.

The malware prioritizes Windows as its target and leverages the legitimate command-line tool runas[.]exe to execute programs under different user permissions.

The objective is to elevate privileges, gain administrative access, and bypass security measures to collect extensive user data efficiently.

- Advertisement - Google News

Evasion of Antivirus

Due to its use of the Go programming language, the malware exhibits cross-platform compatibility, enabling it to expand its impact to various platforms.

Bandit Stealer employs sandbox detection mechanisms to adapt its behavior and evade detection or analysis based on specific indicators it checks for:-

  • container
  • jail
  • KVM
  • QEMU
  • sandbox
  • Virtual Machine
  • VirtualBox
  • VMware
  • Xen

Including a Linux-specific command in the malware suggests that it may be designed to infect Linux machines and is likely undergoing testing, as accessing the “/proc/self/status” file path on a Windows system would lead to an error.

The malware retrieves and saves the content from a Pastebin link (hxxps[:]//pastebin[.]com/raw/3fS0MSjN) in the AppData folder, as a file called “blacklist.txt.”

Here below, we have mentioned all the details that this list contains:-

  • Hardware IDs
  • IP addresses
  • MAC addresses
  • Usernames
  • Hostnames
  • Process names

While all these details primarily serve the purpose of identifying whether the malware is operating within a sandbox or undergoing testing.

Distribution of the Malware

The malware spreads via phishing emails, disguising itself as a harmless MS Word attachment that distracts the user while initiating the infection process in the background.

Microsoft’s access control mechanism runs malware as an administrator with credentials, useful when the user lacks sufficient privileges for program execution.

The malware modifies the Windows Registry, persists, and collects personal and financial data from crypto wallets and web browsers.

Bandit Stealer steals Telegram sessions

Bandit Stealer steals Telegram sessions for unauthorized access, enabling impersonation and malicious actions like accessing private messages and data.

Browsers & Wallets Scanned

Here below, we have mentioned the browsers:-

  • 7Star
  • YandexBrowser
  • Brave-Browser
  • Amigo
  • Torch
  • Google Chrome Canary
  • Google Chrome
  • Cent Browser
  • Sputnik
  • Iridium
  • Orbitum
  • UCozMedia
  • Epic Privacy Browser
  • Microsoft Edge
  • Kometa

Here below, we have mentioned all the wallets that are scanned:-

  • Clover Wallet
  • Jaxx Liberty
  • Wombat
  • TronLink
  • Trust Wallet
  • Crypto.com
  • BitKeep: Crypto & NFT Wallet

Here below, we have mentioned the types of data that are stolen from the victim’s browser:-

  • Login data
  • Cookies
  • Web history
  • Credit card details

Researchers found a fake Heart Sender installer that tricks users into launching embedded malware, automating spam SMS and email sending.

Stolen information from Bandit Stealer and similar stealers enables attackers to engage in identity theft, data breaches, financial gain, account hijacking, credential-stuffing, selling to other cybercriminals, and conducting follow-on attacks like double extortion and ransomware.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...