New Bandit Malware Attacks Browsers to Steal Personal & Financial Logins

Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection.

The malware prioritizes Windows as its target and leverages the legitimate command-line tool runas[.]exe to execute programs under different user permissions.

The objective is to elevate privileges, gain administrative access, and bypass security measures to collect extensive user data efficiently.

Evasion of Antivirus

Due to its use of the Go programming language, the malware exhibits cross-platform compatibility, enabling it to expand its impact to various platforms.

Bandit Stealer employs sandbox detection mechanisms to adapt its behavior and evade detection or analysis based on specific indicators it checks for:-

  • container
  • jail
  • KVM
  • QEMU
  • sandbox
  • Virtual Machine
  • VirtualBox
  • VMware
  • Xen

Including a Linux-specific command in the malware suggests that it may be designed to infect Linux machines and is likely undergoing testing, as accessing the “/proc/self/status” file path on a Windows system would lead to an error.

The malware retrieves and saves the content from a Pastebin link (hxxps[:]//pastebin[.]com/raw/3fS0MSjN) in the AppData folder, as a file called “blacklist.txt.”

Here below, we have mentioned all the details that this list contains:-

  • Hardware IDs
  • IP addresses
  • MAC addresses
  • Usernames
  • Hostnames
  • Process names

While all these details primarily serve the purpose of identifying whether the malware is operating within a sandbox or undergoing testing.

Distribution of the Malware

The malware spreads via phishing emails, disguising itself as a harmless MS Word attachment that distracts the user while initiating the infection process in the background.

Microsoft’s access control mechanism runs malware as an administrator with credentials, useful when the user lacks sufficient privileges for program execution.

The malware modifies the Windows Registry, persists, and collects personal and financial data from crypto wallets and web browsers.

Bandit Stealer steals Telegram sessions

Bandit Stealer steals Telegram sessions for unauthorized access, enabling impersonation and malicious actions like accessing private messages and data.

Browsers & Wallets Scanned

Here below, we have mentioned the browsers:-

  • 7Star
  • YandexBrowser
  • Brave-Browser
  • Amigo
  • Torch
  • Google Chrome Canary
  • Google Chrome
  • Cent Browser
  • Sputnik
  • Iridium
  • Orbitum
  • UCozMedia
  • Epic Privacy Browser
  • Microsoft Edge
  • Kometa

Here below, we have mentioned all the wallets that are scanned:-

  • Clover Wallet
  • Jaxx Liberty
  • Wombat
  • TronLink
  • Trust Wallet
  • BitKeep: Crypto & NFT Wallet

Here below, we have mentioned the types of data that are stolen from the victim’s browser:-

  • Login data
  • Cookies
  • Web history
  • Credit card details

Researchers found a fake Heart Sender installer that tricks users into launching embedded malware, automating spam SMS and email sending.

Stolen information from Bandit Stealer and similar stealers enables attackers to engage in identity theft, data breaches, financial gain, account hijacking, credential-stuffing, selling to other cybercriminals, and conducting follow-on attacks like double extortion and ransomware.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB bootloader that allows for local privilege…

14 hours ago

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve, allegedly compromising 33 terabytes of sensitive…

14 hours ago

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying reports, which affects tens of thousands…

17 hours ago

Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements

Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay $11.3 million to resolve allegations of…

21 hours ago

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef. This operation leverages the SugarGh0st RAT…

22 hours ago

Chinese Winnti Group Intensifies Financially Motivated Attacks

Hackers are increasingly executing financially motivated attacks and all due to the lucrative potential of monetizing the stolen data, ransoms,…

2 days ago