Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Kids ‘picked last in gym class’ prepare for Super Bowl

NBA star Giannis Antetokounmpo joins Calci as an investor

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Security bug in StealC malware panel allows researchers to monitor threat actor operations
Identity

Security bug in StealC malware panel allows researchers to monitor threat actor operations

userBy userJanuary 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 19, 2026Malware/Threat Intelligence

Cybersecurity researchers have revealed a cross-site scripting (XSS) vulnerability in the web-based control panel used by StealC information stealer operators. This allows us to gather important insights into one of the attackers who use the malware in production.

“By exploiting this, they were able to collect system fingerprints, monitor active sessions, and, in a development that surprised no one, steal cookies from the very infrastructure they were designed to steal them from,” CyberArk researcher Ari Novik said in a report published last week.

StealC is an information theft vector that first emerged in January 2023 based on a malware-as-a-service (MaaS) model, allowing potential customers to distribute malicious programs under the guise of cracks of popular software, using YouTube as a primary mechanism (a phenomenon known as the YouTube Ghost Network).

cyber security

Over the past year, this stealer has also been observed spreading via malicious Blender Foundation files and a social engineering tactic known as FileFix. Meanwhile, StealC received its own update, bringing Telegram bot integration for sending notifications, payload delivery enhancements, and a redesigned panel. The updated version was codenamed StealC V2.

A few weeks later, the source code for the malware’s admin panel was leaked, giving the research community the opportunity to identify characteristics of threat actors’ computers, including their rough location and details about their computer hardware, and to retrieve active session cookies from their machines.

The exact details of the XSS flaw in the panel are not disclosed to prevent developers from plugging the hole or other imitators from trying to use the leaked panel to launch their own stealer MaaS services.

Generally, an XSS flaw is a type of client-side injection that allows an attacker to obtain a susceptible website and execute malicious JavaScript code in a web browser on a victim’s computer when the site is loaded. These occur as a result of user input not being validated and properly encoded, allowing attackers to steal cookies, impersonate users, and access sensitive information.

“Given that the StealC group’s core business includes cookie theft, one might expect StealC’s developers to be cookie experts and implement basic cookie security features such as httpOnly to prevent researchers from stealing cookies via XSS,” Novick said. “The irony is that an operation built around large-scale cookie theft failed to protect its own session cookies from textbook attacks.”

CyberArk also shared details of a StealC customer named YouTubeTA (short for “YouTube Threat Actor”). The customer used Google’s video sharing platform extensively to distribute stealers by promoting cracked versions of Adobe Photoshop and Adobe After Effects, and had amassed more than 5,000 logs, including 390,000 stolen passwords and more than 30 million stolen cookies. Most cookies are rated as tracking cookies and other non-sensitive cookies.

These efforts are suspected to have allowed attackers to seize control of legitimate YouTube accounts and use them to promote cracked software and create self-perpetuating propagation mechanisms. There is also evidence that fake CAPTCHA lures like ClickFix were used to distribute StealC, suggesting that these are not limited to infections via YouTube.

cyber security

Further analysis revealed that this panel allows operators to create multiple users and differentiate between administrator users and regular users. In the case of YouTubeTA, only one admin user is known to appear on the panel, and this user is said to be using an Apple M3 processor-based machine with English and Russian language settings.

In what could be described as an operational security mistake on the attacker’s part, location information was exposed around mid-July 2025 when the attacker forgot to connect to the StealC panel via a virtual private network (VPN). This revealed the real IP address that was associated with a Ukrainian provider called TRK Cable TV. Our findings indicate that YouTubeTA is a lone wolf actor operating in Eastern European countries where Russian is commonly spoken.

The study also highlights the impact of the MaaS ecosystem. While the MaaS ecosystem allows threat actors to grow at scale in a short period of time, it also unintentionally exposes them to security risks that legitimate enterprises deal with.

“StealC developers have demonstrated weaknesses in both cookie security and panel code quality, which allowed us to collect large amounts of data about our customers,” CyberArk said. “If this holds true for other attackers selling malware, researchers and law enforcement could also use similar flaws to gain insight into, and perhaps even reveal the identity of, many malware operators.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCISO guide to AI security investments
Next Article Making the Citizens Energy Package work for Europeans
user
  • Website

Related Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

Kids ‘picked last in gym class’ prepare for Super Bowl

NBA star Giannis Antetokounmpo joins Calci as an investor

New York state lawmaker proposes three-year moratorium on new data centers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.