Thursday, March 6, 2025
HomeCyber AttackNew Fury Stealer Attacking Victims to Steal Login Passwords

New Fury Stealer Attacking Victims to Steal Login Passwords

Published on

SIEM as a Service

Follow Us on Google News

A new malicious software named “Fury Stealer” has been detected, posing a significant threat to online security.

The malware, created by an unidentified threat actor, is designed to steal sensitive information, including login passwords, from unsuspecting victims.

Cybersecurity analyst MonThreat first reported the announcement of this harmful tool on the social media platform X.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Advanced Features and Capabilities

Fury Stealer is a sophisticated malware with various features that make it particularly dangerous. It can create an executable file with a single command, allowing rapid deployment.

The malware can steal personal data, including Discord accounts, browser-stored passwords, cookies, autofill information, and even credit card details.

Additionally, it targets gaming platforms like Steam and Growtopia, as well as messaging services such as Telegram.

One of Fury Stealer’s standout features is its ability to find Discord backup codes, making it a potent threat to users who rely on Discord for communication.

The malware also includes an anti-virtual machine (VM) and virtual desktop infrastructure (VDS) component, which helps it evade detection by security researchers.

Furthermore, it can simulate fake errors to deceive users into thinking their systems are malfunctioning for other reasons.

Cybersecurity Experts on High Alert

The discovery of Fury Stealer has put cybersecurity experts on high alert. The malware’s ability to disable or enable plugins and its incompatibility injection feature make it adaptable and hard to detect.

Experts advise users to be vigilant, update their security software, and avoid downloading suspicious files or clicking on unknown links.

As the threat landscape continues to evolve, the emergence of tools like Fury Stealer underscores the importance of robust cybersecurity measures.

Users are encouraged to regularly update passwords and enable two-factor authentication to protect their accounts from such sophisticated attacks.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Alli AI Announces Upcoming Public Launch of AI-Powered Content Creation Platform

AI Soft has announced the upcoming public release of Alli AI, an advanced artificial...

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025,...

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications...

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has...