Tuesday, April 16, 2024

BloodyStealer Malware Steals Cookies, Passwords, Bank Cards From Gamers Browser

It has been identified recently that the BloodyStealer is being traded on the dark web market. It is a Trojan that is generally used to steal accounts from accounts of successful gaming platforms, which include:-

  • Steam
  • Epic Games Store
  • EA Origin

The BloodyStealer Trojan has a trick to avoid detection, and it fetches less than $10 on the darknet for a monthly subscription and $40 for an unlimited subscription.

However, there are many threats that are being faced by gamers, that are connected with loss of personal data, and particularly, accounts along with several gaming services.

Types of data stolen by BloodyStealer

Here are the types of data stolen by the BloodyStealer from the browsers:-

  • Cookies
  • Passwords
  • Bank cards


BloodyStealer is one of the new and still new on the market when the experts analyzed other existent malware tools. Apart from this, they have also investigated the telemetry data, and they came to know some detections of BloodyStealer in the following regions:-

  • Europe
  • Latin America
  • The APAC region 

And here the most important point is that this Trojan has mainly affected the home users.

Features of BloodyStealer

This new Trojan has a full list of features, that makes it unique and strong, and here we have mentioned them below:-

  • Grabber for cookies, passwords, forms, bank cards from browsers.
  • Stealer for all information about the PC and screenshots.
  • Steals sessions from the following clients: Bethesda, Epic Games, GOG, Origin, Steam, Telegram, VimeWorld.
  • Steals files from the desktop (.txt) and the uTorrent client.
  • Collects logs from the memory.
  • Duplicate logging protection.
  • Reverse engineering protection.
  • Not functional in the CIS.

Command and Control

The BloodyStealer transfer all exfiltrated data to a C&C server, so, that the threat actors can easily access the data by utilizing Telegram or through a web panel. 

Some other threat actors monetize the collected data that is being sold to them by the actual threat actors those who have collected it. Whenever a threat actor gets logged in to the C&C web panel, they will eventually notice a basic dashboard along with victim-related statistics.

Not only this but both the C&C servers are located behind Cloudflare, which generally hides their actual IPs and implements a layer of assurance against DDoS and web attacks.

Darknet markets

Here the attackers collect a significant number of game-related logs, login credentials, and some other data, encouraging a well-developed supply, and demand chain for all the stolen credentials on the dark web.

Therefore, the security experts have specially analyzed all the active offers on twelve global darknet forums and marketplaces that use English or Russian languages.

Wholesale deals and Retail options

In BloodyStealer, wholesale products are the most popular and logs are among one of them. However, it is possible to obtain logs per unit or one can purchase in bulk and simply process them with the help of concentrated services.

However, the average price per log is 34¢; the price per 100 logs is $17.83, for wholesale products. In the case of retail products, all these products were being offered at just 60-70% of their original price.

There are some criminals who can possess thousands of accounts and offer access to these at an immense discount. But it also has some useless accounts that cost nothing, and others have already been collected by their original owners.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates


Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles