Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection.
The malware prioritizes Windows as its target and leverages the legitimate command-line tool runas[.]exe to execute programs under different user permissions.
The objective is to elevate privileges, gain administrative access, and bypass security measures to collect extensive user data efficiently.
Due to its use of the Go programming language, the malware exhibits cross-platform compatibility, enabling it to expand its impact to various platforms.
Bandit Stealer employs sandbox detection mechanisms to adapt its behavior and evade detection or analysis based on specific indicators it checks for:-
Including a Linux-specific command in the malware suggests that it may be designed to infect Linux machines and is likely undergoing testing, as accessing the “/proc/self/status” file path on a Windows system would lead to an error.
The malware retrieves and saves the content from a Pastebin link (hxxps[:]//pastebin[.]com/raw/3fS0MSjN) in the AppData folder, as a file called “blacklist.txt.”
Here below, we have mentioned all the details that this list contains:-
While all these details primarily serve the purpose of identifying whether the malware is operating within a sandbox or undergoing testing.
The malware spreads via phishing emails, disguising itself as a harmless MS Word attachment that distracts the user while initiating the infection process in the background.
Microsoft’s access control mechanism runs malware as an administrator with credentials, useful when the user lacks sufficient privileges for program execution.
The malware modifies the Windows Registry, persists, and collects personal and financial data from crypto wallets and web browsers.
Bandit Stealer steals Telegram sessions for unauthorized access, enabling impersonation and malicious actions like accessing private messages and data.
Here below, we have mentioned the browsers:-
Here below, we have mentioned all the wallets that are scanned:-
Here below, we have mentioned the types of data that are stolen from the victim’s browser:-
Researchers found a fake Heart Sender installer that tricks users into launching embedded malware, automating spam SMS and email sending.
Stolen information from Bandit Stealer and similar stealers enables attackers to engage in identity theft, data breaches, financial gain, account hijacking, credential-stuffing, selling to other cybercriminals, and conducting follow-on attacks like double extortion and ransomware.
Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors…
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…