Infosteeler

A collection of 10 posts
PXA Stealer Malware Uses Trusted Cloud Services to Exfiltrate Government and Education Credentials
Malware

PXA Stealer Malware Uses Trusted Cloud Services to Exfiltrate Government and Education Credentials

Threat Group: Vietnamese-speaking cybercrime actors (possible overlap with CoralRaider) Threat Type: Python-based Information Stealer (Infostealer) Exploited Vulnerabilities: DLL sideloading, phishing ZIP archives, abuse of legitimate cloud services (Cloudflare Workers, Dropbox) Malware Used: PXA Stealer Threat Score: πŸ”₯ Critical (9.0/10) – Due to advanced evasion, large-scale credential theft, and abuse of
3 min read
Acreed Infostealer Becomes Top Credential Theft Tool After Lumma Takedown
Infosteeler

Acreed Infostealer Becomes Top Credential Theft Tool After Lumma Takedown

Threat Group: Unknown (Emerging actors on Russian Market) Threat Type: Infostealer Malware Exploited Vulnerabilities: Phishing, Malvertising, SEO Poisoning, ClickFix social engineering, AI-generated deception, DLL-SideLoading Malware Used: Acreed Infostealer Threat Score: πŸ”΄ High (7.8/10) – Rapid adoption, advanced session token theft, and critical infrastructure targeting Last Threat Observation: June 4, 2025
4 min read
PowerShell-Delivered Chihuahua Stealer Distributed via Google Drive Targets Credentials and Wallets
Malware

PowerShell-Delivered Chihuahua Stealer Distributed via Google Drive Targets Credentials and Wallets

Threat Group: Unknown Threat Type: Infostealer Malware Exploited Vulnerabilities: None (Relies on social engineering and legitimate services) Malware Used: Chihuahua Stealer Threat Score: πŸ”΄ High (7.8/10) – Due to its advanced encryption techniques, stealthy multi-stage execution, and targeting of sensitive data such as browser credentials and cryptocurrency wallets. Last Threat
3 min read
Cozy Bear Launches Wine-Tasting Phishing Campaign to Deploy WineLoader
Phishing

Cozy Bear Launches Wine-Tasting Phishing Campaign to Deploy WineLoader

Threat Group: APT29 (Cozy Bear / Midnight Blizzard / NOBELIUM) Threat Type: Advanced Persistent Threat (APT) – Cyberespionage Exploited Vulnerabilities: None (social engineering and DLL side-loading) Malware Used: GrapeLoader (initial-stage loader), WineLoader (modular backdoor) Threat Score: πŸ”₯Β Critical (9.2/10) due to campaign sophistication, high-value diplomatic targeting, and stealth evasion techniques Last Threat
3 min read
SYS01 Malware Exploits Meta Business Ads to Steal Credentials
Malware

SYS01 Malware Exploits Meta Business Ads to Steal Credentials

Threat Overview Threat Group: Unknown, suspected Rilide malware affiliates Threat Type: Infostealer Malware Exploited Vulnerabilities: Browser credential storage, Facebook account access, Windows Task Scheduler Malware Used: SYS01 Infostealer Threat Score: High (8.5/10) β€” Due to sophisticated targeting of widely-used platforms, persistent evasion tactics, and expansive reach Last Threat Observation:
2 min read