Wednesday, April 23, 2025
HomeCyber Security NewsKurayStealer - Tool Sold to Criminals that Have Password Stealing and Screenshot...

KurayStealer – Tool Sold to Criminals that Have Password Stealing and Screenshot Capabilities

Published on

SIEM as a Service

Follow Us on Google News

There was an advertisement by a discord user with the handle “Portu” that exploded over the internet on April 23rd, 2022 for a new password-stealing malware builder.

It is a sort of program that enables so-called script kiddie hackers, to construct their own executables from scratch. Recently, the threats analysts at Uptycs have discovered, in the wild, the first sample of what they called KurayStealer, which had been based on the Portu-inspired malware.

This malware, KurayStealer has been used by the threat actors to target Discord users primarily.

- Advertisement - Google News

Discovery

On 27 April 2022, the first sample of KurayStealer malware was detected by the Uptycs threat intelligence systems. 

Moreover, the cybersecurity researchers at Uptycs performed OSINT research in which they found that the threat actors have used YouTube to advertise this malicious builder for the first time on 23 April 2022.

Not only that even they also advertised this builder on Discord as well with the name or alias “Portu.” Python 3.0 (also known as Py3k or Python 3000) is the programming language the builder is written in.

The builder uses the command “wmic csproduct get UUID” to find the universally unique identifier for the product upon execution.

Apps Exploited to Harvest Passwords & Tokens

KurayStealer harvests the passwords and tokens from the following applications:-

  • Discord
  • Lightcord
  • Discord PTB
  • Opera
  • Opera GX
  • Amigo
  • Torch
  • Kometa
  • Orbitum
  • CentBrowser
  • 7Star
  • Sputnik
  • Vivaldi
  • Chrome SxS
  • Chrome
  • Epic Privacy Browser
  • Microsoft Edge
  • Uran
  • Yandex
  • Brave
  • Iridium

KurayStelaer OSINT

In KurayStelaer, you’ll find a number of components that combine to create a wide variety of password stealers that use the Discord tokens as both command and control (C2) channels and harvest all of the victim information.

Also included in the builder code was the link for the invite to the Discord channel for the creators of the builder.

A post is mentioned on the channel regarding the commercial version of this builder in different price ranges. Moreover, Portu’s Discord profile contains the names of two channels:-

  • A Shoppy link
  • A YouTube link

The author’s Shoppy profile for “Portu” was linked to additional tools and commercial offerings that are planned to build.

While the YouTube link contains the videos from the author, but, the YouTube video that was uploaded by the author has been deleted from the author’s channel.

Recommendations

Here below we have mentioned all the recommendations provided by the experts:-

  • Tight security controls
  • Multi-layered visibility
  • Robust security solutions
  • YARA process scanning capabilities
  • Multi-factor authentication

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...