#InfoStealer

2026-03-04

Command-and-control domain tree, 2026-02-19 to 2026-03-04 #InfoStealer
abjuri5t.github.io/SarlackLab/

*.suncrest[.]in[.]net
*.agenciadelivearte[.]com[.]br

2026-03-04
2026-02-26

"Adoro l'odore degli #screenshot rubati dagli #infostealer al mattino" cit.

@sicurezza

2026-02-22

Hello everyone! It's been a slightly quieter 24 hours in the cyber world, but we still have some interesting developments to cover, including a peek into AI-assisted malware development and a significant data privacy gaffe. Let's dive in:

AI-Assisted Info-Stealer Experiment: Arkanix Stealer 🤖

- A new information-stealing malware, Arkanix Stealer, was promoted on dark web forums for a brief period in late 2025 before its author abruptly took it down.
- Kaspersky researchers found strong indicators of Large Language Model (LLM) involvement in its development, suggesting an experiment to rapidly build and deploy malware, potentially reducing development time and costs.
- Arkanix offered extensive data-stealing capabilities, targeting browser data, cryptocurrency wallets, VPN credentials, and gaming platforms, with a premium C++ version adding advanced features like the ChromElevator post-exploitation tool.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Cornwall Council's Data Breach Blunder ⚠️

- Cornwall Council in the UK is facing a data breach claim after allegedly exposing the personal details of ten complainants to the subject of their complaints, Cllr Dulcie Tudor.
- Despite four individuals requesting redaction, the council's process failed, with Cllr Tudor gaining access to names, home addresses, email addresses, and phone numbers simply by opening the attached complaint files.
- This incident highlights critical flaws in the council's data handling procedures and raises concerns about compliance with data protection regulations, prompting an immediate review of how sensitive information is processed and shared.

🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Malware #InfoStealer #AI #LLM #DataPrivacy #DataBreach #GDPR #InfoSec #CyberNews

2026-02-22

Arkanix Stealer Targets Browsers via Dual Implementation

Arkanix Stealer is a MaaS infostealer with both C++ and Python implementations.

Pulse ID: 699b559757b9fda783b4d450
Pulse Link: otx.alienvault.com/pulse/699b5
Pulse Author: cryptocti
Created: 2026-02-22 19:14:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #MaaS #OTX #OpenThreatExchange #Python #bot #cryptocti

2026-02-21

CharlieKirk Credential Theft Malware Targeting Windows

CharlieKirk Grabber is a Python-based Windows infostealer that rapidly steals browser credentials

Pulse ID: 699a25c4c3fd0bde93c72263
Pulse Link: otx.alienvault.com/pulse/699a2
Pulse Author: cryptocti
Created: 2026-02-21 21:38:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #Malware #OTX #OpenThreatExchange #Python #Windows #bot #cryptocti

2026-02-21

📢⚠️ New ClickFix attack uses fake CAPTCHA pages to trick users into running PowerShell malware. The infostealer targets crypto wallets, 25+ browsers, gaming accounts, and VPN data.

Read: hackread.com/clickfix-attack-c

#CyberSecurity #Malware #Infostealer #ClickFix #Captcha

2026-02-19

Fake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis

A sophisticated malware campaign targeting macOS users has been discovered, utilizing typosquatted domains impersonating the Homebrew package manager. The attack, dubbed ClickFix, exploits users' trust in command-line installation processes. Victims are tricked into executing malicious curl commands, leading to the deployment of a credential harvester and the Cuckoo Stealer malware. This infostealer establishes persistence through LaunchAgents, bypasses Gatekeeper, and employs encrypted C2 communication. It systematically exfiltrates sensitive data including browser credentials, cryptocurrency wallets, and system information. The campaign's infrastructure spans multiple domains hosted on shared IP addresses, indicating a coordinated and evolving threat.

Pulse ID: 69972ba35a28ae9de06a7308
Pulse Link: otx.alienvault.com/pulse/69972
Pulse Author: AlienVault
Created: 2026-02-19 15:26:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #Mac #MacOS #Malware #OTX #OpenThreatExchange #RAT #Rust #bot #cryptocurrency #AlienVault

2026-02-19

Arkanix Stealer: a C++ & Python infostealer

A C++ and Python infostealer, dubbed Arkanix, has been developed and used by Kaspersky, a leading security firm, to spread and steal data from organisations across the globe.

Pulse ID: 6996f650827c9b89d94e32af
Pulse Link: otx.alienvault.com/pulse/6996f
Pulse Author: CyberHunter_NL
Created: 2026-02-19 11:38:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #InfoStealer #Kaspersky #OTX #OpenThreatExchange #Python #bot #CyberHunter_NL

2026-02-19

📢⚠️ Infostealer malware now targeting AI identity and memory files, researchers find #OpenClaw data theft exposing a user’s digital blueprint.

Read: hackread.com/infostealer-steal

#CyberSecurity #Malware #Infostealer #Malware #AI

Andy Thompson (rainmaker)Andy_Thompson@infosec.exchange
2026-02-16

📬 Hackers Are Literally Mailing You Scam Letters 📬

Threat actors are sending physical letters through postal mail pretending to be from Trezor and Ledger, manufacturers of cryptocurrency hardware wallets. The letters use official-looking branding and urgent language to trick recipients into revealing their wallet recovery phrases on fake websites. The scam represents a sophisticated blend of physical and digital social engineering.

Sources:
bleepingcomputer.com/news/secu
cryptotimes.io/2026/02/16/ledg
crypto.news/crypto-hackers-tar
phemex.com/news/article/scamme

#Cryptocurrency #Trezor #Ledger #PhishingScam #HardwareWallet
----------

🤖 Trusted AI Tool Weaponized to Hack Macs 🤖

Threat actors are abusing Claude AI's Artifacts feature and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users. The attacks target users searching for specific technical queries, showing malicious Google Ads that lead to Claude-generated artifacts containing malware. This represents a concerning abuse of AI-generated content for malware distribution.

Sources:
bleepingcomputer.com/news/secu
cyberpress.org/malicious-campa
rescana.com/post/claude-llm-ar
news4hackers.com/clickfix-atta

#Claude #MacMalware #Infostealer #GoogleAds #AI
----------

❄️ ShinyHunters Strikes Again: 600K Records Leaked ❄️

The notorious ShinyHunters data extortion group claims to have stolen more than 600,000 Canada Goose customer records containing personal and payment-related information. Canada Goose told BleepingComputer the dataset appears to relate to past customer transactions and investigators have not found evidence of a breach of Canada Goose's own systems. The company is investigating whether the data came from a third-party vendor or partner.

Sources:
bleepingcomputer.com/news/secu
securityaffairs.com/188046/dat
techradar.com/pro/security/can
vpncentral.com/canada-goose-60

#DataBreach #CanadaGoose #ShinyHunters #CustomerData #CyberSecurity

2026-02-16

Infostealers now targeting AI agents.
OpenClaw configs exfiltrated:
• Gateway tokens
• Private keys
• “Soul” files
• Memory logs

Result: full AI identity compromise.
technadu.com/infostealer-evolv

Are AI configs your new high-value assets?

#AI #Infostealer #InfoSec

Brazilian Crowdfunding Platform APOIA.se Data Breach Exposes Over 450,000 Users
2026-02-16

Infostealers now targeting AI agents.

OpenClaw configs exfiltrated:
• Gateway tokens
• Private keys
• “Soul” files
• Memory logs

Result: full AI identity compromise.
technadu.com/infostealer-evolv

Are AI configs your new high-value assets?

#AI #Infostealer #InfoSec

Infostealer Evolves to Target AI Agents, OpenClaw Configurations
2026-02-14

Claude Artifacts to abused to MacSync Infostealer in in ClickFix

Attackers abusedpublicClaude artifacts andpromoted themthrough
GoogleAdstomakemalicious linksappear legitimateinsearchresults

Pulse ID: 69905ba50237cf43b0cadc4c
Pulse Link: otx.alienvault.com/pulse/69905
Pulse Author: cryptocti
Created: 2026-02-14 11:25:25

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Google #InfoSec #InfoStealer #Mac #OTX #OpenThreatExchange #bot #cryptocti

2026-02-14

ClickFix campaigns are now leveraging LLM-generated public artifacts for malware distribution.

Per Moonlock Lab and AdGuard:
• Abuse of Claude artifact pages
• Google Ads search poisoning
• Obfuscated shell execution (base64 decode → zsh)
• Second-stage loader for MacSync infostealer
• Hardcoded API key + token-protected C2
• AppleScript (osascript) handling data theft
• Archive staging at /tmp/osalogging.zip
• Multi-attempt POST exfiltration

Previous campaigns exploited ChatGPT and Grok sharing features.
LLM trust is now an operational risk vector.
Should EDR flag suspicious AI-guided shell patterns?

Source: bleepingcomputer.com/news/secu

Engage below.
Follow @technadu for deep technical threat analysis.

#ThreatIntel #MacOSSecurity #Infostealer #C2Traffic #ClickFix #LLMSecurity #MalwareAnalysis #AppSec #BlueTeam #EDR #ThreatHunting #CyberThreats #ZeroTrust

Claude LLM artifacts abused to push Mac infostealers in ClickFix attack
Ars Technica Newsarstechnica@c.im
2026-02-11

Once-hobbled Lumma Stealer is back with lures that are hard to resist arstechni.ca/9U5H #castleloader #infostealer #Security #clickfix #malware #Biz&IT #lumma

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst