Malware-as-a-service is becoming one of the greatest contributors to cyberattacks since it makes entry for cybercriminals extremely easier. This is because most of the hacking forums are selling malware, trojans, and viruses which are being leveraged by many hackers.
In recent reports by Zscaler researchers, a new type of sophisticated credential stealer malware was found which was named “BlackGuard”. This malware is sold at a price of $700 lifetime and $200 a month.
This malware is capable of stealing information related to Crypto Wallets, Saved browser credentials, email clients, VPN messengers, and FTP credentials. This malware also has the ability to evade detection as well as anti-debugging.
BlackGuard is still in the development stage. It is written in .NET packed with crypto packer.
When this malware is executed, it is coded to kill processes related to antivirus and sandbox.
Source: zscaler
This malware has dual decoding. It is encoded in an array of bytes which is first decoded into ASCII strings during runtime. These ASCII strings are then decoded into base64. This helps to evade antivirus and string-based detection.
BlackGuard gathers information about the location of the infected device by making a request to “http://ipwhois.app/xml/“. If BlackGuard detects the location of a Commonwealth of Independent States (CIS), it exits the device.
BlackGuard can stop any disruption from users when debugging. This is achieved by the use of user32!BlockInput(). It blocks all mouse and keyboard inputs.
After all the pre-checks are executed, BlackGuard executes the stealer function which collects various information about browsers, software, and other directories.
BlackGuard steals credentials from Chrome and other Gecko-based browsers. It steals history, autofill information, passwords, and downloads.
The malware also supports the stealing of wallet information and other sensitive information. It specifically targets sensitive data files such as wallet.dat which will contain the private key access to the wallet and other data. Usually, these files are stored in the AppData folder which is targeted by the malware.
Most of browsers have extensions for crypto wallets for easy access to users. The malware also targets browsers such as Chrome and Edge for these extensions to steal sensitive information.
Once it collects all this information from the targeted machine, it converts the data into a single .zip file and sends it to the server by making a POST request. The request also contains information about the system Hardware ID and country.
Browsers
Crypto Wallets
Crypto Wallet Extensions
Email Clients
Email Clients include Outlook
Other Applications
Messengers
Though BlackGuard has not had many applications, it still poses a big threat as it is continuously being developed and improved by underground hackers.
In order to prevent stealer malware like BlackGuard,
Zscaler has published a full report on how this malware works and its analysis.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions…
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing…
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI…
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables…
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address…
As a dedicated bug bounty hunter with an enviable track record on BugCrowd, Abdullah Nawaf, Full…