Malware & RansomwareHIGH

Infostealer Storm - New Malware Hijacks Sessions Seamlessly

Featured image for Infostealer Storm - New Malware Hijacks Sessions Seamlessly
VAVaronis Blog
Storminfostealersession hijackingcredential theftcybercrime
🎯

Basically, Storm is a new type of malware that steals your login details without you noticing.

Quick Summary

A new infostealer named Storm is making waves in the cybercrime world. It stealthily hijacks sessions and decrypts sensitive data server-side. This poses serious risks to users, especially in corporate environments. Understanding its operation is key to enhancing security measures.

What Happened

A new infostealer named Storm has emerged in underground cybercrime networks, marking a significant evolution in credential theft tactics. This malware, available for under $1,000 a month, allows operators to harvest sensitive information such as browser credentials, session cookies, and crypto wallets. Once collected, this data is sent to the attacker's server for decryption, making it harder for security tools to detect malicious activity.

Traditionally, infostealers decrypted credentials directly on the victim's machine, which left clear signs that something was amiss. However, with advancements like Google’s App-Bound Encryption in Chrome, attackers have adapted by moving decryption to their own infrastructure. This shift helps them evade detection by endpoint security tools.

Who's Being Targeted

Storm targets a wide range of users, from individual crypto enthusiasts to employees in corporate environments. With its ability to harvest saved passwords, session cookies, and even Google account tokens, a single compromised browser can grant attackers unauthorized access to various SaaS platforms and internal tools. The malware's stealthy operation allows it to bypass traditional password alerts, making it a formidable threat.

Active campaigns have been detected across multiple countries, including the US, Brazil, and India, indicating a broad scope of potential victims. The malware's capability to collect data from popular messaging platforms like Telegram and Discord further expands its reach, making it a versatile tool for cybercriminals.

Signs of Infection

Indicators of compromise for Storm include unusual browser activity, unauthorized access to accounts, and unexpected session logs. The malware's unique method of server-side decryption means that traditional signs of infection, like local credential access, may not be present. Instead, victims might notice strange login attempts or account access from unfamiliar locations.

To detect Storm, organizations should monitor for signs of session hijacking and unusual data access patterns. Regular audits of account activity and implementing multi-factor authentication can help mitigate risks associated with this malware.

How to Protect Yourself

To safeguard against threats like Storm, users and organizations should adopt several best practices:

  • Regularly update software: Ensure that browsers and security tools are up to date to protect against vulnerabilities.
  • Implement multi-factor authentication: This adds an extra layer of security, making it harder for attackers to gain unauthorized access.
  • Educate employees: Awareness training can help users recognize phishing attempts and suspicious activity.
  • Monitor for unusual activity: Keep an eye on account access and session logs to catch potential breaches early.

By staying vigilant and implementing these protective measures, users can reduce their risk of falling victim to the evolving landscape of credential theft.

🔒 Pro insight: The server-side decryption method of Storm represents a critical evolution in infostealer tactics, necessitating enhanced detection capabilities in endpoint security solutions.

Original article from

VAVaronis Blog· Daniel Kelley
Read Full Article

Related Pings

HIGHMalware & Ransomware

WhatsApp-Delivered VBS Malware Hijacks Windows via UAC Bypass

Microsoft warns of a new malware campaign using WhatsApp to distribute malicious VBS files. Windows users are at risk as attackers gain remote access and escalate privileges. Stay vigilant and avoid executing unknown scripts.

The Hacker News·
HIGHMalware & Ransomware

Russian Hackers Exploit CTRL Toolkit for RDP Hijacking

Russian hackers are leveraging a new malware toolkit called CTRL to hijack RDP sessions and steal credentials. This poses a serious risk to organizations using remote access. Stay informed and protect your systems against this evolving threat.

Cyber Security News·
HIGHMalware & Ransomware

EtherRAT - Hackers Hide Malware Infrastructure on Ethereum

Hackers are leveraging EtherRAT to hide malware within the Ethereum blockchain. This sophisticated tool targets various sectors, making detection challenging. Organizations must act quickly to mitigate risks and protect their assets.

Cyber Security News·
HIGHMalware & Ransomware

CrystalX Malware - New MaaS Threat Spotted on Telegram

A new malware named CrystalX is being marketed on Telegram. This Malware-as-a-Service combines RAT and credential stealing features, posing significant risks to users worldwide. Organizations must act quickly to safeguard against this evolving threat.

Cyber Security News·
HIGHMalware & Ransomware

Venom Stealer - New MaaS Fuels ClickFix and Crypto Theft

A new malware-as-a-service, Venom Stealer, is facilitating ClickFix attacks that lead to cryptocurrency theft. Users of popular browsers are at risk. Organizations must implement strong security measures to defend against this evolving threat.

SC Media·
MEDIUMMalware & Ransomware

Malicious Script - Understanding Fileless Malware Persistence

A new malicious script reveals the rise of fileless malware. This stealthy malware minimizes its footprint while ensuring persistence through registry manipulation. Understanding this threat is crucial for effective cybersecurity.

SANS ISC·