Thursday, January 30, 2025
HomeChromeFleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

FleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

Published on

SIEM as a Service

Follow Us on Google News

A newly identified strain of information-stealing malware, FleshStealer, is making headlines in 2025 due to its advanced evasion techniques and targeted data extraction capabilities.

Flashpoint analysts have shed light on its operation, revealing a sophisticated tool that poses significant risk to organizations worldwide.

Designed to bypass traditional defenses and target sensitive data, FleshStealer is emerging as a notable cyber threat in an already complex cybersecurity landscape.

Advanced Evasion Techniques and Data Targeting

First observed in September 2024, FleshStealer is a C#-based credential stealer executed through a web-based control panel.

Its standout features include extensive encryption mechanisms, the ability to detect virtual machine (VM) environments, and termination of operations when debugging tools are detected.

FleshStealer
Debugger output showing the creation of files containing gathered data.

These techniques aim to prevent forensics analysis, demonstrating the malware’s capability to disrupt static and dynamic security investigations effectively.

Beyond its stealth, FleshStealer shows versatility in its target scope. It specifically focuses on Chromium and Mozilla-based web browsers, extracting data from over 70 browser extensions, crypto wallets, and two-factor authentication (2FA) settings.

Additionally, it has a unique ability to reset Google cookies, enabling threat actors to hijack sessions for further exploitation.

Such targeted capabilities make FleshStealer highly effective at harvesting confidential information like stored credentials, browser session data, and other valuable artifacts.

How It Operates

FleshStealer leverages several Tactics, Techniques, and Procedures (TTPs), as documented by Flashpoint analysts.

For privilege escalation, it exploits legitimate Windows utilities to bypass user account controls (UAC) and achieve administrative rights without raising alarms.

To evade detection, it uses obfuscated files, string decryption routines, and registry operations to mask its behavior.

FleshStealer
System information gathered for enumeration and detection.

The malware also employs advanced scanning mechanisms to identify whether it is running in sandboxed or VM environments, ensuring execution only on genuine user systems.

Another key characteristic is its tailored data collection process. FleshStealer targets high-value files, credentials, and user data, compressing the stolen information into archives for efficient exfiltration.

By leveraging encrypted communication channels and web services for data transmission, the malware bypasses standard network security measures, making detection and mitigation challenging for cybersecurity teams.

FleshStealer’s operational efficiency and advanced anti-detection features signify an evolving threat in the cybersecurity realm.

Analysts note that its modular architecture allows easy updates, suggesting its capabilities could expand further.

With infostealers remaining a persistent challenge in cybercrime, tools like FleshStealer highlight the need for proactive defense strategies.

Flashpoint emphasizes the importance of real-time monitoring and intelligence in staying ahead of such threats.

Organizations are urged to strengthen defenses against initial access attacks, adopt threat intelligence solutions, and regularly update their incident response protocols.

FleshStealer’s rise underscores the critical need for vigilance in safeguarding sensitive information against increasingly sophisticated malware.

For comprehensive insights into FleshStealer and other emerging threats, Flashpoint offers detailed analysis and actionable intelligence to help organizations fortify their cyber resilience.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued seven Industrial Control Systems...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued seven Industrial Control Systems...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate...