Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Rivian will resume work at the Georgia factory, emails show

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Golden Chicken unfolds terrastealerv2 to steal browser credentials and crypto wallet data
Identity

Golden Chicken unfolds terrastealerv2 to steal browser credentials and crypto wallet data

userBy userMay 5, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Steal malware browser credentials and crypto wallet data

The threat actor known as the Golden Chicken is attributed to two new malware families called Terrastealerv2 and Terralogger, suggesting ongoing development efforts to tweak and diversify weapons.

“Terrastealerv2 is designed to collect browser credentials, cryptocurrency wallet data and browser extension information,” says the future Insikt group. “In contrast, Terralogger is a standalone keylogger. It uses a typical low-level keyboard hook to record keystrokes and writes logs to a local file.”

Golden Chickens, also known as Venom Spider, is a name given to a financially motivated threat actor linked to the infamous family of malware called More_eggs. It has been known to be active since at least 2018 and offers Wears under the Malware as a Service (MAAS) model.

As of 2023, the golden chicken was attributed to an online persona known as Badbullzvenom, which is thought to be jointly run by Canadian and Romanian individuals. Other malicious tools developed by the E-Crime group include More_eggs Lite (Oka Lite_more_eggs), Venomlnk, Terraloader, and Terracrypt.

Cybersecurity

Late last year, Zscaler Threatlabz ​​details new golden chicken-related activities, including a backdoor called Revc2 and a loader called Venom Loader, both of which will be delivered via Venomlnk.

The latest recorded Future findings show that threat actors continue to tackle their products and are releasing updated versions of steeler malware that can harvest data from browsers, cryptocurrency wallets and browser extensions.

Terrastealerv2 is distributed in a variety of formats, including executable files (EXE), dynamic link library (DLL), Windows Installer Packages (MSI), and shortcuts (LNK) files.

In all these cases, the steeler payload is delivered in the form of OCX (short for Microsoft’s OLE control extension) obtained from the external domain (“wetransfers).[.]io “).

“It targets the Chrome ‘login data’ database and steals credentials, but does not bypass the Application Bound Encryption (ABE) protection introduced in Chrome updates since July 2024. It shows that the malware code is outdated or is still under development,” the cybersecurity company said.

Data captured by terrastealerv2 is drawn in both the telegram and the domain “wetransfers[.]IO. “It also utilizes trusted Windows utilities such as regsvr32.exe and mshta.exe to avoid detection.

Terralogger, also propagated as an OCX file, is designed to record keystrokes. However, it does not include data delamination or command and control (C2) communication features. This suggests that it was an early development or intended to be used in conjunction with another malware portion of the golden chicken MAAS ecosystem.

“The current state of Terrastealerv2 and Terralogger suggests that both tools remain under active development and do not yet exhibit the level of stealth normally associated with the mature golden chicken tools,” said the recorded Future.

“Given the history of Golden Chicken, which developed malware for credentials and access operations, these features could continue to evolve.”

This disclosure arises amid the emergence of new steeler malware families such as Hannibal Steeler, Gremlin Steeler and Null Point Steeler.

Cybersecurity

It also follows discovering an updated version of the STEALC malware that supports the addition of streamlined command and control (C2) communication protocols and RC4 encryption.

“The malware payload delivery options have been enhanced to include Microsoft Software Installer (MSI) packages and PowerShell scripts,” Zscaler Threatlabz ​​said in a report published last week.

“The redesigned control panel provides an integrated builder that allows threat actors to customize payload delivery rules based on geolocation, hardware ID (HWID), and installed software. Additional features include multi-monitor screenshot capture, unified file grabbers, and server-side brute force.”

New 2.2.4. The version introduced in March 2025 (aka Stealc V2) has been observed to be distributed via another malware loader called Amadey. The Control Panel also supports Telegram Bot Integration to send notifications, allowing customization of message formats.

“STEALC V2 introduces improvements such as enhanced payload delivery, streamlined communication protocols with encryption, and a redesigned control panel that provides more targeted information collection,” Zscaler said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRather than discussion, the “Ethics Bowl” helps students to show a new world of discourse
Next Article HIELD, WARRIORS advances in the NBA playoffs by winning Game 7 against Rocket | Basketball News
user
  • Website

Related Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

July 17, 2025

Hackers exploit flaws in apache http server to deploy linuxsys cryptocurrency miner

July 17, 2025

Europol destroys Hacktivist Group linked to DDOS attacks against Ukraine

July 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers use GitHub repository to host Amadey Malware and Data Stealers and bypass filters

Openai launches a general purpose agent with ChatGpt

Rivian will resume work at the Georgia factory, emails show

Boulevard raises $80 million to power the self-care boom driven by Botox and GLP-1 surges

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.