New SantaStealer malware steals data from browsers, crypto wallets
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要快速浏览文章内容。文章讲的是一个新的恶意软件即服务(MaaS)信息窃取器,叫做SantaStealer。它在Telegram和黑客论坛上被宣传,运行在内存中以避免基于文件的检测。 接着,安全研究人员指出,这实际上是BluelineStealer的重新品牌,并且开发者计划在今年年底前推出。SantaStealer由俄罗斯开发者开发,提供两种订阅模式:Basic每月175美元,Premium每月300美元。 然后,Rapid7分析了样本,并访问了附属面板。结果显示,尽管宣传说能逃避检测,但实际样本很容易被检测到。面板允许用户配置不同的攻击范围,从全面数据窃取到只收集特定数据。 此外,SantaStealer使用了14个数据收集模块,每个模块在独立线程运行,并通过端口6767将数据分块发送到C2服务器。它还能够绕过Chrome的保护机制,并且配置选项中可以排除某些地区。 最后,Rapid7建议用户注意可疑链接和附件,并避免运行未经验证的代码。 现在我需要把这些要点浓缩到100字以内。重点包括:新的恶意软件即服务信息窃取器SantaStealer,在Telegram和论坛上推广;运行内存中以逃避检测;由俄罗斯开发者开发;提供两种订阅模式;具有多种数据窃取功能;但样本容易被检测到;计划年底前推出。 </think> 新的恶意软件即服务信息窃取器SantaStealer在Telegram和论坛上推广,运行内存中以逃避检测。由俄罗斯开发者开发,提供Basic(175美元/月)和Premium(300美元/月)订阅模式。具有多种数据窃取功能但样本易被检测。计划年底前推出。 2025-12-15 22:45:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

New SantaStealer malware steals data from browsers, crypto wallets

A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.

According to security researchers at Rapid7, the operation is a rebranding of a project called BluelineStealer, and the developer is ramping up the operation ahead of a planned launch before the end of the year.

SantaStealer appears to be the project of a Russian-speaking developer and is promoted for a Basic, $175/month subscription, and a Premium for $300/month.

SantaStealer ad
SantaStealer ad
Source: Rapid7

Rapid7 analyzed several SantaStealer samples and obtained access to the affiliate web panel, which revealed that the malware comes with multiple data-theft mechanisms but does not rise to the advertised feature for evading detection and analysis.

"The samples we have seen until now are far from undetectable, or in any way difficult to analyze," Rapid7 researchers say in a report today.

"While it is possible that the threat actor behind SantaStealer is still developing some of the mentioned anti-analysis or anti-AV techniques, having samples leaked before the malware is ready for production use - complete with symbol names and unencrypted strings - is a clumsy mistake likely thwarting much of the effort put into its development and hinting at poor operational security of the threat actor(s)," Rapid7 says.

The panel features a user-friendly design where 'customers' can configure their builds with specific targeting scopes, ranging from full-scale data theft to lean payloads that only go after specific data.

Builder configuration options on the panel
Builder configuration options on the panel
Source: Rapid7

SantaStealer uses 14 distinct data-collection modules, each running in its own thread, writing stolen data to memory, archiving it into a ZIP file, and then exfiltrating it in 10MB chunks to a hardcoded command-and-control (C2) endpoint via port 6767.

The modules target information in the browser (passwords, cookies, browsing history, saved credit cards), Telegram, Discord, and Steam data, cryptocurrency wallet apps and extensions, and documents. The malware can also take screenshots of the user’s desktop.

The malware uses an embedded executable to bypass Chrome’s App-Bound Encryption protections, first introduced in July 2024, and bypassed by multiple active info-stealers.

Other configuration options allow its operators to exclude systems in the Commonwealth of Independent States (CIS) region and delay execution to misdirect victims with an inactivity period.

As SantaStealer isn’t fully operational and hasn't been distributed en masse, it is unclear how it will spread. However, cybercriminals lately seem to prefer ClickFix attacks, where users are tricked into pasting dangerous commands into their Windows terminal.

Phishing, pirated software, or torrent downloads are also common distribution methods, as are malvertising and deceptive YouTube comments.

Rapid7 recommends users check links and attachments in emails they don't recognize. They also warn of running unverified code from public repositories for extensions.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/new-santastealer-malware-steals-data-from-browsers-crypto-wallets/
如有侵权请联系:admin#unsafe.sh