Researchers hack malware gang via its own weak spot
Briefly

Researchers hack malware gang via its own weak spot
"Security researchers at CyberArk discovered a critical flaw in StealC malware's infrastructure. Using an XSS vulnerability, they gained access to sessions of cybercriminals who were stealing cookies themselves. StealC is an infostealer that has been active since early 2023 and is offered as Malware-as-a-Service (MaaS)."
"This attacker distributed StealC via YouTube channels by disguising malware as cracked versions of Adobe Photoshop and After Effects. The build IDs in the system had names such as 'YouTube', 'YouTube2', and 'YouTubeNew', which gave away the distribution tactic. YouTubeTA had over 5,000 stolen logs on the command-and-control server. These contained 390,000 passwords and more than 30 million cookies. Screenshots automatically taken by StealC upon infection showed that victims were searching for illegal software on YouTube."
"In the spring of 2025, the StealC group experienced turbulent months. Immediately after the release of version 2, the web panel leaked. TRAC Labs then published a technical analysis that questioned the quality of the malware. What did not make headlines at the time turned out to be much more damaging in retrospect. During analysis of the leaked code, researchers discovered a vulnerability that allowed them to observe StealC operators."
An XSS vulnerability in StealC's web panel allowed access to operator sessions, exposing operator behavior and stolen data. StealC has operated since 2023 as an infostealer offered as Malware-as-a-Service, focusing on cookies, passwords, and other sensitive data. Infostealers caused 86% of data breaches in 2025 and stole 1.8 billion login credentials. After version 2 release, the web panel leaked and contained a flaw that enabled observation of operators. One operator, YouTubeTA, distributed builds via YouTube channels disguised as cracked Adobe software and collected over 5,000 logs, 390,000 passwords, and more than 30 million cookies. Screenshots showed victims searching for pirated software.
Read at Techzine Global
Unable to calculate read time
[
|
]