Tuesday, March 4, 2025
HomeChromeFleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

FleshStealer: A new Infostealer Attacking Chrome & Mozilla Users

Published on

SIEM as a Service

Follow Us on Google News

A newly identified strain of information-stealing malware, FleshStealer, is making headlines in 2025 due to its advanced evasion techniques and targeted data extraction capabilities.

Flashpoint analysts have shed light on its operation, revealing a sophisticated tool that poses significant risk to organizations worldwide.

Designed to bypass traditional defenses and target sensitive data, FleshStealer is emerging as a notable cyber threat in an already complex cybersecurity landscape.

Advanced Evasion Techniques and Data Targeting

First observed in September 2024, FleshStealer is a C#-based credential stealer executed through a web-based control panel.

Its standout features include extensive encryption mechanisms, the ability to detect virtual machine (VM) environments, and termination of operations when debugging tools are detected.

FleshStealer
Debugger output showing the creation of files containing gathered data.

These techniques aim to prevent forensics analysis, demonstrating the malware’s capability to disrupt static and dynamic security investigations effectively.

Beyond its stealth, FleshStealer shows versatility in its target scope. It specifically focuses on Chromium and Mozilla-based web browsers, extracting data from over 70 browser extensions, crypto wallets, and two-factor authentication (2FA) settings.

Additionally, it has a unique ability to reset Google cookies, enabling threat actors to hijack sessions for further exploitation.

Such targeted capabilities make FleshStealer highly effective at harvesting confidential information like stored credentials, browser session data, and other valuable artifacts.

How It Operates

FleshStealer leverages several Tactics, Techniques, and Procedures (TTPs), as documented by Flashpoint analysts.

For privilege escalation, it exploits legitimate Windows utilities to bypass user account controls (UAC) and achieve administrative rights without raising alarms.

To evade detection, it uses obfuscated files, string decryption routines, and registry operations to mask its behavior.

FleshStealer
System information gathered for enumeration and detection.

The malware also employs advanced scanning mechanisms to identify whether it is running in sandboxed or VM environments, ensuring execution only on genuine user systems.

Another key characteristic is its tailored data collection process. FleshStealer targets high-value files, credentials, and user data, compressing the stolen information into archives for efficient exfiltration.

By leveraging encrypted communication channels and web services for data transmission, the malware bypasses standard network security measures, making detection and mitigation challenging for cybersecurity teams.

FleshStealer’s operational efficiency and advanced anti-detection features signify an evolving threat in the cybersecurity realm.

Analysts note that its modular architecture allows easy updates, suggesting its capabilities could expand further.

With infostealers remaining a persistent challenge in cybercrime, tools like FleshStealer highlight the need for proactive defense strategies.

Flashpoint emphasizes the importance of real-time monitoring and intelligence in staying ahead of such threats.

Organizations are urged to strengthen defenses against initial access attacks, adopt threat intelligence solutions, and regularly update their incident response protocols.

FleshStealer’s rise underscores the critical need for vigilance in safeguarding sensitive information against increasingly sophisticated malware.

For comprehensive insights into FleshStealer and other emerging threats, Flashpoint offers detailed analysis and actionable intelligence to help organizations fortify their cyber resilience.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES)...

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT)...