Tuesday, April 15, 2025
Homecyber securityNew Styx Stealer Attacking Users to Steal Login Passwords

New Styx Stealer Attacking Users to Steal Login Passwords

Published on

SIEM as a Service

Follow Us on Google News

A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and autofill information from popular web browsers.

This malware affects Chromium and Gecko-based browsers and extends its reach to browser extensions, cryptocurrency wallets, and even messaging platforms like Telegram and Discord.

According to a recent tweet from ThreatMon, the revelation of Styx Stealer has raised alarms among cybersecurity experts and users alike, as it poses a significant risk to online security.

- Advertisement - Google News

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Exploiting Windows Defender Vulnerability

Styx Stealer exploits a vulnerability in Microsoft Windows Defender SmartScreen, identified as CVE-2023-36025, also known as Phemedrone Stealer.

This vulnerability became widespread in early 2024, allowing malicious actors to bypass security measures and infiltrate users’ systems.

Exploiting this vulnerability highlights the ongoing challenges in maintaining robust cybersecurity defenses, especially as threat actors continue to find and exploit weaknesses in widely used software.

Interestingly, a demonstration of the Styx Stealer’s capabilities has been posted on its developer’s YouTube channel.

Although the channel is not active, the demonstration has caught the attention of cybersecurity professionals working to mitigate the threat.

Additionally, a threat actor has been found offering the Styx Stealer for sale on a popular Russian forum, indicating a potential for widespread distribution.

This development underscores the need for vigilance among users and organizations to protect their digital assets.

As the situation unfolds, experts recommend that users update their security software, remain cautious of suspicious links and downloads, and regularly change their passwords to safeguard against potential breaches.

The emergence of Styx Stealer serves as a stark reminder of the evolving landscape of cyber threats and the importance of proactive cybersecurity measures.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...