Tuesday, March 4, 2025
HomeCyber Security NewsBlackGuard - New Password Stealing Malware Sold In Russian Hacking Forum

BlackGuard – New Password Stealing Malware Sold In Russian Hacking Forum

Published on

SIEM as a Service

Follow Us on Google News

Malware-as-a-service is becoming one of the greatest contributors to cyberattacks since it makes entry for cybercriminals extremely easier. This is because most of the hacking forums are selling malware, trojans, and viruses which are being leveraged by many hackers. 

In recent reports by Zscaler researchers, a new type of sophisticated credential stealer malware was found which was named “BlackGuard”. This malware is sold at a price of $700 lifetime and $200 a month.

This malware is capable of stealing information related to Crypto Wallets, Saved browser credentials, email clients, VPN messengers, and FTP credentials.  This malware also has the ability to evade detection as well as anti-debugging.
Image

Analysis

BlackGuard is still in the development stage. It is written in .NET packed with crypto packer.

Evasion

When this malware is executed, it is coded to kill processes related to antivirus and sandbox.
Image

Source: zscaler

String Obfuscation

This malware has dual decoding. It is encoded in an array of bytes which is first decoded into ASCII strings during runtime. These ASCII strings are then decoded into base64. This helps to evade antivirus and string-based detection.Image

Anti-CIS

BlackGuard gathers information about the location of the infected device by making a request to “http://ipwhois.app/xml/“. If BlackGuard detects the location of a Commonwealth of Independent States (CIS), it exits the device.

Image

Anti-Debug

BlackGuard can stop any disruption from users when debugging. This is achieved by the use of user32!BlockInput(). It blocks all mouse and keyboard inputs.
Image

Stealer Function

After all the pre-checks are executed, BlackGuard executes the stealer function which collects various information about browsers, software, and other directories.
Image

Browsers

BlackGuard steals credentials from Chrome and other Gecko-based browsers. It steals history, autofill information, passwords, and downloads.

Image

Cryptocurrency Wallets

The malware also supports the stealing of wallet information and other sensitive information. It specifically targets sensitive data files such as wallet.dat which will contain the private key access to the wallet and other data. Usually, these files are stored in the AppData folder which is targeted by the malware.

Image

Crypto Extensions

Most of browsers have extensions for crypto wallets for easy access to users. The malware also targets browsers such as Chrome and Edge for these extensions to steal sensitive information.

Image

Command and Control (C2) Exfiltration

Once it collects all this information from the targeted machine, it converts the data into a single .zip file and sends it to the server by making a POST request. The request also contains information about the system Hardware ID and country.
Image

Image
Image

Applications Targeted

Browsers

  • Chrome
  • Opera
  • Firefox
  • MapleStudio
  • Iridium
  • 7Star
  • CentBrowser
  • Chedot
  • Vivaldi
  • Kometa
  • ElementsBrowser
  • EpicPrivacyBrowser
  • uCozMedia
  • Coowon
  • liebao
  • QIPSurf
  • Orbitum
  • Comodo
  • Amigo
  • Torch
  • Comodo
  • 360Browser
  • Maxthon3
  • K-Melon
  • Sputnik
  • Nichrome
  • CocCoc
  • Uran
  • Chromodo
  • Edge
  • BraveSoftware

Crypto Wallets

  • AtomicWallet
  • BitcoinCore
  • DashCore
  • Electrum
  • Ethereum
  • Exodus
  • LitecoinCore
  • Monero
  • Jaxx
  • Zcash
  • Solar
  • Zap
  • AtomicDEX
  • Binance
  • Frame
  • TokenPocket
  • Wassabi

Crypto Wallet Extensions

  • Binance
  • coin98
  • Phantom
  • Mobox
  • XinPay
  • Math10
  • Metamask
  • BitApp
  • Guildwallet
  • iconx
  • Sollet
  • SlopeWallet
  • Starcoin
  • Swash
  • Finnie
  • KEPLR
  • Crocobit
  • OXYGEN
  • Nifty
  • Liquality
  • Auvitaswallet
  • Mathwallet
  • MTVwallet
  • Rabetwallet
  • Roninwallet
  • Yoroiwallet
  • ZilPaywallet
  • Exodus
  • TerraStation
  • Jaxx

Email Clients

Email Clients include Outlook

Other Applications

  • NordVPN
  • OpenVPN
  • ProtonVpn
  • Totalcomander
  • Filezilla
  • WinSCP
  • Steam

Messengers

  • Telegram
  • Signal
  • Tox
  • Element
  • Pidgin
  • Discord

Conclusion

Though BlackGuard has not had many applications, it still poses a big threat as it is continuously being developed and improved by underground hackers.

In order to prevent stealer malware like BlackGuard,

  • Inspect all traffic inbound and outbound
  • Use MFA where it can be induced
  • Prevent duplicate use of passwords
  • Prevent unknown sites from being visited
  • Prevent unknown from being opened
  • Use sandbox for unknown threats

Zscaler has published a full report on how this malware works and its analysis.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...