Cyber Security News

New Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection.

The malware prioritizes Windows as its target and leverages the legitimate command-line tool runas[.]exe to execute programs under different user permissions.

The objective is to elevate privileges, gain administrative access, and bypass security measures to collect extensive user data efficiently.

Evasion of Antivirus

Due to its use of the Go programming language, the malware exhibits cross-platform compatibility, enabling it to expand its impact to various platforms.

Bandit Stealer employs sandbox detection mechanisms to adapt its behavior and evade detection or analysis based on specific indicators it checks for:-

  • container
  • jail
  • KVM
  • QEMU
  • sandbox
  • Virtual Machine
  • VirtualBox
  • VMware
  • Xen

Including a Linux-specific command in the malware suggests that it may be designed to infect Linux machines and is likely undergoing testing, as accessing the “/proc/self/status” file path on a Windows system would lead to an error.

The malware retrieves and saves the content from a Pastebin link (hxxps[:]//pastebin[.]com/raw/3fS0MSjN) in the AppData folder, as a file called “blacklist.txt.”

Here below, we have mentioned all the details that this list contains:-

  • Hardware IDs
  • IP addresses
  • MAC addresses
  • Usernames
  • Hostnames
  • Process names

While all these details primarily serve the purpose of identifying whether the malware is operating within a sandbox or undergoing testing.

Distribution of the Malware

The malware spreads via phishing emails, disguising itself as a harmless MS Word attachment that distracts the user while initiating the infection process in the background.

Microsoft’s access control mechanism runs malware as an administrator with credentials, useful when the user lacks sufficient privileges for program execution.

The malware modifies the Windows Registry, persists, and collects personal and financial data from crypto wallets and web browsers.

Bandit Stealer steals Telegram sessions

Bandit Stealer steals Telegram sessions for unauthorized access, enabling impersonation and malicious actions like accessing private messages and data.

Browsers & Wallets Scanned

Here below, we have mentioned the browsers:-

  • 7Star
  • YandexBrowser
  • Brave-Browser
  • Amigo
  • Torch
  • Google Chrome Canary
  • Google Chrome
  • Cent Browser
  • Sputnik
  • Iridium
  • Orbitum
  • UCozMedia
  • Epic Privacy Browser
  • Microsoft Edge
  • Kometa

Here below, we have mentioned all the wallets that are scanned:-

  • Clover Wallet
  • Jaxx Liberty
  • Wombat
  • TronLink
  • Trust Wallet
  • Crypto.com
  • BitKeep: Crypto & NFT Wallet

Here below, we have mentioned the types of data that are stolen from the victim’s browser:-

  • Login data
  • Cookies
  • Web history
  • Credit card details

Researchers found a fake Heart Sender installer that tricks users into launching embedded malware, automating spam SMS and email sending.

Stolen information from Bandit Stealer and similar stealers enables attackers to engage in identity theft, data breaches, financial gain, account hijacking, credential-stuffing, selling to other cybercriminals, and conducting follow-on attacks like double extortion and ransomware.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Guru Baran

Guru is an Ex-Security Engineer at Comodo Cybersecurity. Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Cryptojacking Campaign Infected Online Thesaurus With Over 5 Million Visitors

Students, authors, and anybody else wishing to improve their vocabulary and language abilities frequently utilize…

1 day ago

Gold Melody Attacking Organizations With Burp Extension, Mimikatz, and Other Tools

The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking…

2 days ago

MOVEit Transfer SQL Injection Let the Attacker Gain Unauthorized Access to the Database

MOVEit transfer service pack has been discovered with three vulnerabilities associated with SQL injections (2)…

2 days ago

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools & Apps

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal…

2 days ago

Is QakBot Malware Officially Dead?

Only a few malware families can claim to have persisted for nearly twenty years, and…

3 days ago

System Admin Pleads Guilty for Selling Pirated Business Phone Software Licenses

For taking part in a large international scheme to earn millions of dollars by selling pirated…

3 days ago