Microsoft Windows Warning —‘Malicious’ New Threat Steals Bitcoin, Ethereum, Crypto From Users (2024)

An alarming report from Check Point Research, published today and detailed first here on Forbes, warns that a powerful new attack from a known threat actor is now underway. Targeting Windows users, this “malicious” new malware will steal anything it can find—including browser cookies, security credentials and instant messages. The underlying malware has been seen before, but this latest iteration has been enhanced to be much better at emptying crypto wallets.

The malware is an adaptation of the Phemedrone Stealer which made headlines earlier this year. Exploiting a vulnerability in Microsoft Windows Defender, the software executes scripts on PCs without prompting any security warnings.

ForbesSamsung Warns Millions Of Galaxy Users—You Will Miss Update DeadlineBy

Microsoft patched CVE-2023-36025 last year, and users can protect themselves by ensuring their OS is up-to-date. But at a time when hundreds of millions of Windows 10 users are counting down the weeks until their support ends in October 2025, many without a device capable of a Windows 11 upgrade or the money to buy a new PC, such protracted exploitations are set to become a much more serious issue.

Check Point says that this new malware variant, dubbed Styx Stealer, “is linked to one of the Agent Tesla threat actors, Fucosreal.” Agent Tesla is a Windows RAT that is usually provided as Malware-As-A-Service (MaaS). Once a PC has been infected, more dangerous software can be installed, often leading to ransomware attacks.

Styx Stealer is available to rent at $75 per month, albeit a lifetime license is only $350. Check Point told me that “the website selling Styx Stealer is still active, and anyone can purchase it… We also observe that the creator of Styx Stealer is active on Telegram, responding to messages. The creator is also working on a second product, Styx Crypter, which helps bypass antivirus protection. As a result, Styx Stealer continues to pose a potential threat to many users worldwide.”

Read More: Google Pixel Deadline—You Have Just 9 Days To Update Your Phone

While Styx Stealer exploits a Windows vulnerability to infect a PC, it also leverages other security weaknesses including the theft of session cookies which enable a threat actor to replicate a secure login on their own machine. The primary target for such thefts is Google Chrome, given the scale of its install base. Google is now shutting down the vulnerability, linking session cookies to a specific device ID. Even more potently, Google is also shutting down the potential for a threat actor to exploit a device bound cookie with a malware-enabled rogue login—or even another physical user—on the same machine, encrypting and binding cookie data to specific apps, rather than the primary user seemingly logged into another app.

But it’s not just Chrome under threat, Check Point says that Styx Stealer targets all Chromium-based browsers, including Edge, Opera and Yandex, and Gecko-based alternatives, including Firefox, Tor Browser and SeaMonKey.”

There are devious new elements to this latest malware when it comes to crypto theft. Check Point told me “crypto-stealing through crypto-clipping is a new functionality absent in Phemedrone Stealer, [which] works autonomously without a C&C server all the time the malware is installed on the victim's machine.”

The new capabilities added to the malware make it much more adept at quietly stealing crypto in the background. “In an endless loop at a configurable set interval (default two milliseconds),” Check Point explains, “Styx Stealer checks the content of the clipboard. If it has changed, it triggers a crypto-clipper function….stealing cryptocurrency during transactions by substituting the original wallet address with the attacker’s wallet address… The crypto-clipper includes 9 regex patterns for addresses across various blockchains: BTC, ETH, XMR, XLM, XRP, LTC, NEC, BCH, DASH.”

When stealing crypto, the malware applies additional defenses to protect its ongoing operation. “If the crypto-clipper is enabled in the configuration, Styx Stealer applies additional anti-debugging and analysis techniques. All checks are performed only once after the stealer is launched. The stealer includes a comprehensive list of process names associated with various debuggers and analysis software. It searches for and terminates these processes.”

Clever though this might be, the hackers slipped up, enabling Check Point to make the link to the known Agent Tesla threat actor. “During the debugging of Styx Stealer,” the team explains, “the developer made a fatal error and leaked data from his computer, which allowed CPR to obtain a large amount of intelligence, including the number of clients, profit information, nicknames, phone numbers, and email addresses, as well as similar data about the actor behind the Agent Tesla campaign.”

Check Point’s investigation also identified target industries and geographies, where the attacker harvested credentials as well as Telegram chats, malware sales and contact information in Turkey, Spain and Nigeria—the latter being the home of Fucosreal. It remains unclear which locations link back to the threat actor itself, albeit online identities were tracked down. All the various threads pulled and breadcrumbs followed by Check Point are laid out in detail in its report, including an analysis of the choreography of a Styx Stealer malware sale and subsequent support.

ForbesNew Warning As ‘Spike’ In GPS Spoofing Attacks Hit Passenger Planes—Fasten Your SeatbeltsBy

“In the shadowy world of cybercrime,” Check Point says, “even the most cunning hackers can make blunders that expose their operations… The attacks we detected were intercepted at an early stage by Check Point's Threat Emulation, preventing Styx Stealer from being loaded onto customers' computers. Unfortunately, we do not have full visibility into how many users were actually attacked globally.”

MORE FROMFORBES ADVISOR

Best High-Yield Savings Accounts Of 2024ByKevin PayneContributor
Best 5% Interest Savings Accounts of 2024ByCassidy HortonContributor

Check Point’s message is clear. Make sure you keep Windows up-to-date, especially if you have a crypto wallet or trade any form of cryptocurrency on your PC. This new malware is usually distributed by malicious links and attachments in emails and messages—so the usual rules apply to ignoring all such temptations.

Microsoft Windows Warning —‘Malicious’ New Threat Steals Bitcoin, Ethereum, Crypto From Users (2024)
Top Articles
Indiana Trucking Accident Laws | Expertise.com
Mibridges features - Mi Bridges
Calvert Er Wait Time
I Make $36,000 a Year, How Much House Can I Afford | SoFi
Amc Near My Location
Pieology Nutrition Calculator Mobile
FFXIV Immortal Flames Hunting Log Guide
Mileage To Walmart
Lenscrafters Westchester Mall
Riegler & Partner Holding GmbH auf LinkedIn: Wie schätzen Sie die Entwicklung der Wohnraumschaffung und Bauwirtschaft…
Directions To Lubbock
Katie Boyle Dancer Biography
Erskine Plus Portal
Seth Juszkiewicz Obituary
Gas Station Drive Thru Car Wash Near Me
Craigslist Alabama Montgomery
Dit is hoe de 130 nieuwe dubbele -deckers -treinen voor het land eruit zien
National Office Liquidators Llc
Ostateillustrated Com Message Boards
Spectrum Field Tech Salary
Las 12 mejores subastas de carros en Los Ángeles, California - Gossip Vehiculos
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Traveling Merchants Tack Diablo 4
Indiana Wesleyan Transcripts
Military life insurance and survivor benefits | USAGov
Jobs Hiring Near Me Part Time For 15 Year Olds
Why Are Fuel Leaks A Problem Aceable
Craigslist Panama City Beach Fl Pets
Divina Rapsing
4Oxfun
Astro Seek Asteroid Chart
FREE Houses! All You Have to Do Is Move Them. - CIRCA Old Houses
Wake County Court Records | NorthCarolinaCourtRecords.us
Craigslist Neworleans
THE 10 BEST Yoga Retreats in Konstanz for September 2024
A Man Called Otto Showtimes Near Amc Muncie 12
In Polen und Tschechien droht Hochwasser - Brandenburg beobachtet Lage
Hannibal Mo Craigslist Pets
Shih Tzu dogs for sale in Ireland
2007 Peterbilt 387 Fuse Box Diagram
St Anthony Hospital Crown Point Visiting Hours
Lovely Nails Prices (2024) – Salon Rates
Charli D'amelio Bj
Leland Nc Craigslist
Scythe Banned Combos
De boeken van Val McDermid op volgorde
About us | DELTA Fiber
Deshuesadero El Pulpo
Sj Craigs
Raley Scrubs - Midtown
David Turner Evangelist Net Worth
Www Extramovies Com
Latest Posts
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 6628

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.