Sunday, May 18, 2025
HomeCyber AttackGamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced infostealers targeting global gaming communities.

Documented in Flashpoint’s 2025 Global Threat Intelligence Report, this malware strain exploits gaming enthusiasts’ trust through socially engineered distribution channels, leveraging double-layered encryption, sandbox evasion, and real-time data exfiltration to compromise credentials at scale.

With infostealers responsible for 2.1 billion of 2024’s 3.2 billion stolen credentials, AgeoStealer’s emergence underscores the urgent need for adaptive defense strategies in high-risk sectors.

- Advertisement - Google News

AgeoStealer distinguishes itself through a novel delivery mechanism that capitalizes on gaming culture’s collaborative ethos.

Threat actors impersonate developers on gaming communication platforms, soliciting victims to beta-test a fictitious video game.

A Blogspot webpage that is used to deliver the rar file containing AgeoStealer

The malware arrives as a compressed archive (RAR, ZIP, or 7Z) protected by two passwords-a tactic designed to bypass signature-based antivirus detection.

Inside, attackers deploy a manipulated NSIS installer disguised as a legitimate Unity software package, which executes an Electron application running obfuscated JavaScript payloads.

This multi-stage deployment chain complicates detection, as security tools often overlook password-protected files and misinterpret the NSIS installer’s façade.

Flashpoint analysts emphasize that the approach exploits reduced vigilance during leisure activities, with targets less likely to scrutinize “game testing” requests from peers.

The strategy mirrors recent campaigns by RedLine and Lumma Stealer, but with heightened precision in platform targeting.

Advanced Evasion and Data Exfiltration Tactics Define Operational Framework

AgeoStealer employs the following TTPs:

TacticTechnique IDName
Privilege EscalationT1547Boot or Logon Autostart Execution
Defense EvasionT1027Obfuscated Files or Information
Defense EvasionT1497Virtualization/Sandbox Evasion
Credential AccessT1555Credentials from PasswordStores: Credentials from WebBrowsers
DiscoveryT1057Process Discovery
CollectionT1005Data from Local System
CollectionT1560Archive Collected Data
ExfiltrationT1567Exfiltration Over Web Service

AgeoStealer employs a systematic workflow aligned with MITRE ATT&CK frameworks, beginning with T1547 (Boot/Logon Autostart Execution) to achieve persistence. It plants shortcuts in the Windows Startup directory, ensuring reactivation post-reboot.

Defense evasion relies on T1027 (Obfuscated Files) via custom JavaScript routines that decrypt malicious strings only during runtime, frustrating static analysis.

Setting breakpoints on specific instructions allows the deobfuscated source code to be decrypted

The malware further incorporates T1497 (Virtualization/Sandbox Evasion) through PowerShell scripts that terminate processes tied to debugging tools (e.g., Process Hacker, Wireshark) and virtual machines (VMware, VirtualBox).

By checking system usernames and directories for analysis environment indicators, AgeoStealer halts execution in sandboxed settings, complicating reverse engineering.

Key Technical Tactics Employed by AgeoStealer include:

  • Credential Access (T1555): Extracting credentials from browsers such as Chrome, Firefox, Edge, and Opera.
  • Process Discovery (T1057): Scanning for active browser processes to pinpoint where sensitive data is stored.
  • Data Collection (T1005): Harvesting cookies, session tokens, autofill data, and cryptocurrency wallet information.
  • Large File Scanning: Using the scanDirectoriesForLargeFiles() function to identify and target proprietary documents or databases.
  • Data Compression and Exfiltration (T1567): Compressing stolen data with the adm-zip module and uploading it to GoFile.io for remote retrieval by attackers.
AgeoStealer functionality that has been decrypted and contains the functionality to upload to GoFile

Collected data undergoes compression before exfiltration via GoFile.io, a file-sharing platform enabling stealthy retrieval by attackers.

Rising Threats and Defensive Strategies

The operational sophistication of AgeoStealer signals a paradigm shift in infostealer economics, where low overhead costs and rapid proliferation outpace traditional defense mechanisms.

Flashpoint warns the malware’s real-time exfiltration capabilities facilitate immediate credential abuse, enabling identity theft, financial fraud, and lateral network movement.

Countermeasures require layered approaches: behavioral analytics to detect abnormal process termination patterns, DNS filtering for GoFile.io traffic, and memory analysis to catch JavaScript deobfuscation.

Organizations must also educate gaming enthusiasts on verifying unsolicited software requests and scrutinizing password-protected files.

As cybercriminals refine evasion tactics, Flashpoint anticipates escalating updates to AgeoStealer, including expanded browser targeting and integration with decentralized storage platforms.

Proactive threat intelligence and cross-industry collaboration remain critical to disrupt the infostealer supply chain-a $2.3 billion underground economy driving 78% of ransomware incidents.

With gaming communities at the epicenter of this surge, adaptive security postures and user awareness form the frontline of defense.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...