Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » From browser steelers to intelligence gathering tools
Identity

From browser steelers to intelligence gathering tools

userBy userJune 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 28, 2025Ravi LakshmananMalware/Cyber ​​War

GiftedCrook Malware

The threat actors behind the GiftedCrook malware have made important updates to transform malicious programs from basic browser data steelers into powerful intelligence gathering tools.

“The recent campaign in June 2025 shows that it strengthens its talented ability to remove a wide range of sensitive documents from targeted personal devices, including potentially unique files and browser secrets,” Arctic Wolf Labs said in a report published this week.

“This change in functionality, combined with the contents of the fishing rack, […] It proposes a strategic focus on intelligence newsletters from Ukrainian government and military groups. ”

GiremedCrook was first documented in early April 2025 by the Ukrainian Computer Emergency Response Team (CERT-UA) in connection with a campaign targeting military entities, law enforcement and local autonomous organizations.

Cybersecurity

Activities caused by hacking groups tracking as UAC-0226 include the use of phishing emails that contain Microsoft Excel documents for macro races that act as conduits for deploying GiftedCrook.

Core information stealing malware is designed to steal cookies, browsing history and authentication data from popular web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox.

An analysis of Arctic Wolf artifacts revealed that Steeler began as a demo in February 2025 and later acquired new features in versions 1.2 and 1.3.

These new iterations include the ability to harvest documents and files that are less than 7 MB in size, particularly looking for files that have been created or modified within the last 45 days. Malware specially searches for the following extensions: .doc, .docx, .rtf, .pptx, .ppt, .csv, .xls, .xlsx, .jpeg, .jpg, .png, .pdf, .odt, .rar, .zip, .eml, .txt, .txt, .txt, .txt.

Email campaigns leverage military-themed PDF lures to tempt users to click on the Mega cloud storage link that hosts a macro-enabled Excel workbook (“Academy”) (“GiftedCrook downloaded when recipients turn on macros. Many users are unaware of how macro-enabled Excel files are common in phishing attacks. People often expect work emails, especially spreadsheets that look official or government-related, so they slip past defenses.

The captured information is bundled in a zip archive and stretched to an attacker-controlled telegram channel. If the total archive size exceeds 20 MB, it is classified into multiple parts. By sending stolen ZIP archives in small chunks, GilevedCrook avoids detection and skipping around traditional network filters. In the final stage, a batch script is executed to clear the steeler traces from the compromised host.

Cybersecurity

This not only steals passwords and tracks online behavior, but also provides targeted cyberspy. New features of malware that sift through recent files such as PDFs, spreadsheets, and even VPN configurations and grab documents refer to the bigger goal: collecting intelligence. For those who work in public sector roles or handle sensitive internal reports, this type of document steeler poses real risks not only to individuals but to the entire connected network.

“The timing of the campaign discussed in this report shows a clear alignment with geopolitical events, particularly recent negotiations between Istanbul and Russia,” Arctic Wolf said.

“The progression from a simple qualification theft of GiftedCrook version 1 to a comprehensive documentation and data removal for versions 1.2 and 1.3 reflects coordinated development efforts in which malware features enhance data collection from Ukrainian breach systems according to geopolitical purposes.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFacebook’s new AI tool asks you to upload your photos for story ideas, causing privacy concerns
Next Article Is a cat the only animal?
user
  • Website

Related Posts

Unmasking new TOAD attacks hidden in legitimate infrastructure

January 28, 2026

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Exploring the closed nuclear fuel cycle: From recycling to fuel

Unmasking new TOAD attacks hidden in legitimate infrastructure

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Everything you need to know about the viral personal AI assistant Clawdbot (now Moltbot)

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.