Malware & RansomwareHIGH

Storm Infostealer - New Malware Bypasses Chrome Encryption

Featured image for Storm Infostealer - New Malware Bypasses Chrome Encryption
SCSC Media
Storm infostealerGoogle ChromecryptocurrencymalwareVaronis Threat Labs
🎯

Basically, a new malware steals data from your browser, even if it's encrypted.

Quick Summary

A new malware called Storm infostealer is bypassing Chrome's encryption to steal sensitive user data, especially cryptocurrency wallets. Users in multiple countries are at risk. Stay vigilant and protect your accounts against this emerging threat!

What Happened

A new malware threat named Storm infostealer has emerged, capable of bypassing Google Chrome's encryption. This sophisticated malware targets sensitive user data, particularly focusing on cryptocurrency wallets and private account credentials. Discovered by Varonis Threat Labs, Storm infostealer operates as a malicious subscription service, making it accessible to various criminal teams.

How It Works

Storm infostealer employs a clever technique known as server-side decryption. This method allows it to exfiltrate browser credentials and session cookies without leaving detectable telemetry. By doing this, it effectively evades antivirus software, making it difficult for users to identify its presence. This malware directly counters Google's App-Bound Encryption, which was introduced in Chrome 127.

Who's Being Targeted

The malware is not limited to just one browser; it targets multiple platforms, including Chrome, Edge, Firefox, and Waterfox. Victims have been reported in various countries, including India, Brazil, the United States, and the United Kingdom. Storm infostealer can hijack active sessions, rendering multi-factor authentication ineffective, which significantly increases the risk of unauthorized access.

Affected Services

In addition to stealing cryptocurrency wallet information, Storm infostealer also targets popular messaging apps like Telegram and Discord, as well as major crypto exchanges such as Binance and Coinbase. The malware can even capture screenshots, further compromising user privacy and security.

What You Should Do

To protect yourself from Storm infostealer, consider the following actions:

  • Use Strong Passwords: Ensure that your passwords are complex and unique for each account.
  • Enable Two-Factor Authentication: While this malware can bypass some protections, it’s still a good practice.
  • Regularly Update Your Software: Keep your browser and antivirus software updated to the latest versions.
  • Be Cautious with Links: Avoid clicking on suspicious links or downloading unknown files.
  • Monitor Your Accounts: Regularly check your financial accounts for any unauthorized transactions.

Conclusion

The emergence of Storm infostealer highlights the ongoing battle between cybersecurity measures and evolving malware threats. As users become more aware of their digital security, malware developers continuously adapt their strategies. Staying informed and proactive is essential in safeguarding your sensitive information.

🔒 Pro insight: Storm infostealer's ability to bypass Chrome's encryption underscores the need for enhanced browser security measures and user awareness.

Original article from

SCSC Media
Read Full Article

Related Pings

HIGHMalware & Ransomware

Threat Actors Impersonate CERT-UA to Distribute AGEWHEEZE

Hackers impersonated CERT-UA to distribute AGEWHEEZE malware via phishing emails. About 1 million users across various sectors are at risk. Strengthening security measures is crucial to combat such threats.

SC Media·
HIGHMalware & Ransomware

Bogus Installers - RAT and Cryptominer Spread Alert

Bogus installers are being used to spread RATs and cryptominers in a long-running operation. Users are at risk of infection from these malicious downloads. Stay alert and only download software from trusted sources.

SC Media·
HIGHMalware & Ransomware

Malicious LNK Files - GitHub Used in South Korea Malware Attack

A malware campaign is targeting Windows users in South Korea using malicious LNK files and GitHub for PowerShell scripts. This stealthy attack compromises systems and poses serious risks. Stay alert and protect your network.

SC Media·
HIGHMalware & Ransomware

Akira Ransomware - Accelerated Intrusions Examined

Akira ransomware has drastically improved its attack speed, completing intrusions in under four hours. This poses a serious threat to organizations worldwide. Vigilance and preparedness are essential to combat these rapid intrusions.

SC Media·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC Media·
HIGHMalware & Ransomware

Claude Code Leak - Exploited to Distribute Malware

A malicious GitHub repository is exploiting the Claude Code leak to distribute malware. Tens of thousands of users downloaded compromised versions, risking their sensitive data. Stay informed and protect yourself from these threats.

SC Media·