Wednesday, April 16, 2025
HomeBrowserPeaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data

Peaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data

Published on

SIEM as a Service

Follow Us on Google News

Peaklight malware has emerged as a significant threat, designed to steal sensitive information from compromised endpoints.

This information stealer is often distributed through underground channels and is sometimes offered as a Malware-as-a-Service (MaaS), making it a continuously evolving and potent threat capable of bypassing conventional security measures.

Peaklight’s primary goal is to exfiltrate sensitive data, including login credentials, browser history, financial data, and cryptocurrency wallet keys, while maintaining persistent access to the victim’s device and avoiding common security checks.

- Advertisement - Google News

Detection and Response Strategies

To combat Peaklight malware, organizations can leverage tools like Wazuh, a free open-source security platform, to monitor and safeguard their infrastructure.

Wazuh integrates with Sysmon to gather detailed insights into system activities such as process creation, network connections, and file modifications.

This integration allows for the development of specific detection rules that can identify Peaklight’s malicious behavior.

For instance, Wazuh can detect when PowerShell scripts are executed with unrestricted policies, which is a common tactic used by Peaklight to bypass security measures.

According to the Report, Wazuh also integrates with YARA, a tool used for identifying and classifying malware, to detect and remove malicious files proactively.

By configuring Wazuh’s File Integrity Monitoring (FIM) module to track file modifications in specific directories, organizations can initiate YARA scans to identify malicious files based on predefined rules.

This proactive approach enhances security by neutralizing threats early, preventing them from executing on monitored endpoints.

Technical Details of Peaklight Malware

Peaklight malware executes by running a PowerShell script that bypasses PowerShell’s security and prevents loading user profiles.

It queries system memory using the GlobalMemoryStatusEx API, which may help detect sandbox environments.

The malware allocates memory blocks for code execution and checks network adapter addresses using the GetAdaptersAddresses API.

Peaklight also employs anti-analysis mechanisms to evade detection, making it challenging for traditional security systems to identify and mitigate its activities.

In response to these sophisticated tactics, Wazuh’s detection rules are designed to identify specific behaviors associated with Peaklight, such as rogue file detection in temporary directories and suspicious registry modifications.

These rules trigger alerts on the Wazuh dashboard, allowing organizations to monitor and respond to Peaklight malware activities effectively.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides...

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

SquareX to Reveal Critical Data Splicing Attack at BSides SF, Exposing Major DLP Vulnerability

SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at BSides...

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...