A newly identified malware, Flesh Stealer, is rapidly emerging as a significant cybersecurity threat in 2025.
Designed to extract sensitive data such as passwords, cookies, and browsing history, the malware targets widely used browsers like Google Chrome, Mozilla Firefox, Microsoft Edge, and Opera.
Additionally, it infiltrates messaging applications like Telegram and Signal to exfiltrate stored chats and databases.
Developed using C#, this malware exhibits advanced evasion techniques and has been actively promoted on underground forums and platforms like Discord and Telegram since August 2024.
It uses anti-debugging tools to identify and terminate processes associated with forensic analysis software such as Wireshark.
Furthermore, it incorporates anti-virtual machine (anti-VM) capabilities by scanning system characteristics like BIOS versions and memory configurations to avoid execution in sandboxed environments.
This ensures the malware operates only on genuine user systems, effectively bypassing security researchers’ detection efforts.
The malware also uses Base64 obfuscation to conceal its code and strings, making reverse engineering more challenging.
It can bypass Chrome’s App-Bound Encryption, enabling access to protected data from browser profiles.
Recent updates have expanded its compatibility to Chrome version 131.
It scans for saved passwords, cookies, autofill data, and even crypto wallet credentials from over 70 browser extensions.
The malware also resets Google cookies to hijack active sessions for further exploitation.
Beyond browsers, it leverages Windows Management Instrumentation (WMI) to extract hardware details and uses the ‘netsh’ command-line tool to retrieve Wi-Fi credentials.
All harvested data is compressed into encrypted archives for efficient exfiltration via secure communication channels to attacker-controlled servers.
These measures make detection by traditional network security tools difficult.
The malware is attributed to a Russian-speaking developer who avoids targeting systems in Commonwealth of Independent States (CIS) countries by checking installed input languages.
Flesh Stealer has been marketed aggressively through YouTube tutorials (since removed), underground forums like Pyrex Guru, and dedicated websites that have since been taken offline.
According to the Cyfirma report, the malware operates through a web-based control panel that allows attackers to customize features such as anti-debugging settings or automatic startup execution.
To counter threats like Flesh Stealer:
Flesh Stealer’s rapid evolution underscores the growing sophistication of information-stealing malware in today’s cyber threat landscape.
Proactive defense strategies are essential for mitigating its impact on individuals and organizations alike.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Microsoft recently disclosed a critical vulnerability impacting its debugging tool, WinDbg, and associated .NET packages.…
A series of significant security vulnerabilities have been discovered in the Thinkware Dashcam, specifically the…
The Apache Software Foundation has disclosed several vulnerabilities affecting its Traffic Server software. These vulnerabilities…
Commvault has revealed a major vulnerability in its software that could allow malicious actors to…
A significant vulnerability has been uncovered in the Python JSON Logger package (python-json-logger), affecting versions…
Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations by…