Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Uruguay’s Jose Musica, famous president of Sparse Living, died at 89 | Obituary News

Dallas Mavericks paid $33 million over three years by chimes for patches

US decision to lift sanctions in Syria: This is what you need to know | Syrian war news

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Stealth Rats targeting qualifications and crypto wallets
Identity

Stealth Rats targeting qualifications and crypto wallets

userBy userMarch 18, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Stilachirat targeting credentials and crypto wallets

Microsoft has turned its attention to a new remote access Trojan (RAT) named Stilachirat, saying it will last within the target environment, using advanced techniques aimed at stealing advanced data.

Malware includes the ability to “steal information from the target system, including credentials stored in your browser, digital wallet information, data stored in your clipboard, and system information.”

Tech Giant discovered Stilachirat in November 2024, saying that the rat features exist in a DLL module named “wwstartupctrl64.dll”. Malware is not caused by any particular threat actor or country.

Currently, it is not clear how malware will be delivered to targets, but Microsoft said it is important for organizations to implement appropriate security measures, as such Trojans can be installed through various initial access routes.

Cybersecurity

Stilachirat is designed to collect a wide range of system information, including operating system (OS) details, BIOS serial number, camera presence, active Remote Desktop Protocol (RDP) sessions, and hardware identifiers such as graphical user interface (GUI) applications.

These details are collected through the Component Object Model (COM) web-based Enterprise Management (WBEM) interface using the WMI Query Language (WQL).

It is also designed to target a list of cryptocurrency wallet extensions installed within the Google Chrome web browser. The list includes Bitget Wallet, Trust Wallet, Tron Link, Meta Mask, Token Pocket, BNB Chain Wallet, OKX Wallet, SUI Wallet, and Bra Boss.

Additionally, Stilachirat extracts credentials stored in the Chrome browser, regularly collects clipboard content such as passwords and cryptocurrency wallets, and monitors RDP sessions by capturing foreground window information, establishing contact with remote servers and removing harvested data.

Command and Control (C2) server communication is bidirectional, allowing malware to launch the steps it has been sent from. This feature refers to a versatile tool for both espionage and system operation. Up to 10 different commands are supported –

07 – Displays a dialog box with HTML content rendered from the provided URL 08 – Clear Event Log Entry 09 – Enable system shutdown using the undocumented Windows API (“ntdll.dll!ntshutdownsystem”) 13 – Receives network addresses from the C2 server and establishes a new outbound connection. 14-Accept incoming network connections for TCP port 15 provided 15-End open network connections – Specified application 19-Enumerate all open windows on the current desktop and search for requested title bar text 26-Suspend system (sleep) or hibernation 30-

“Stilachirat shows anti-strong behavior by clearing the event log and checking specific system conditions to avoid detection,” Microsoft said. “This includes loop checking of analysis tools and sandbox timers that prevent full activation in virtual environments commonly used for malware analysis.”

Cybersecurity

The disclosure comes as Palo Alto Networks Unit 42 detailed three unusual malware samples that it detected last year, counting a passive Internet Information Services (IIS) backdoor developed in C++/CLI, a bootkit that uses an unsecured kernel driver to install a GRUB 2 bootloader, and a Windows implant of a cross-platform post-exploitation framework developed in C++ called ProjectGeass.

The IIS backdoor is equipped to parse certain incoming HTTP requests with predefined headers, execute commands within them, execute commands, retrieve system metadata, create new processes, run PowerShell code, and grant the ability to inject shellcode into running or new processes.

Bootkit, on the other hand, is a 64-bit DLL that installs a Grub 2 Bootloader disk image using a legitimately signed kernel driver named AMPA.SYS. It is rated as a proof of concept (POC) created by an unknown political party at the University of Mississippi.

“When you reboot, the Grub 2 bootloader displays the image and plays Dixie periodically through the PC speaker. This behavior can indicate that the malware is an aggressive prank.” “In particular, patching the system with this customized Grub 2 bootloader image of malware only works with certain disk configurations.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMessi injured in Argentina’s FIFA World Cup Qualifier | Football News
Next Article What Israeli and Palestinian groups say about fatal attacks | Israeli-Palestinian conflict news
user
  • Website

Related Posts

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

May 13, 2025

China Link APTS Exploit SAP CVE-2025-31324 581 Critical Systems Around the World

May 13, 2025

Malicious peepy package stealing source code that stole Solana Tools with 761 download

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Uruguay’s Jose Musica, famous president of Sparse Living, died at 89 | Obituary News

Dallas Mavericks paid $33 million over three years by chimes for patches

US decision to lift sanctions in Syria: This is what you need to know | Syrian war news

Israel’s “normalization” takes back seat when Trump announces Saudi Arabia’s deal | Donald Trump News

Trending Posts

Uruguay’s Jose Musica, famous president of Sparse Living, died at 89 | Obituary News

May 13, 2025

US decision to lift sanctions in Syria: This is what you need to know | Syrian war news

May 13, 2025

Israel’s “normalization” takes back seat when Trump announces Saudi Arabia’s deal | Donald Trump News

May 13, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Today’s Top Tech Startup Funding News on May 13, 2025

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Can Your Digital Twin Make You Money? Discover the LEHT Opportunity

Plutus will be released more at bases: a new era of tokenized loyalty rewards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.