Original Article Text

Click to Toggle View

New Arcane infostealer infects YouTube, Discord users via game cheats. A newly discovered information-stealing malware called Arcane is stealing extensive user data, including VPN account credentials, gaming clients, messaging apps, and information stored in web browsers. According to Kaspersky, the malware has no links or code that overlaps with the Arcane Stealer V, which has been circulating on the dark web for years. The Arcane malware campaign started in November 2024, having gone through several evolutionary steps, including primary payload replacements. All conversations and public posts by its operators are in Russian, with Kaspersky's telemetry showing that most Arcane infections are in Russia, Belarus, and Kazakhstan. This is particularly notable, as most threat actors based in Russia typically avoid targeting users within the country and other CIS nations to prevent conflicts with local authorities. Arcane stealer infection chain The campaign distributing Arcane Stealer relies on YouTube videos promoting game cheats and cracks, tricking users into following a link to download a password-protected archive. These files contained a heavily obfuscated 'start.bat' script that fetched a second password-protected archive with malicious executables. The downloaded files add an exclusion to Windows Defender's SmartScreen filter for all drive root folders or turn it off completely through Windows Registry modifications. Previously, the attacks used another stealer malware family called VGS, a rebranded version of the Phemedrone trojan, but they switched to Arcane in November 2024. Kaspersky also found recent changes in the distribution method, including the use of a fake software downloader, supposedly for popular game cracks and cheats, named ArcanaLoader. ArcanaLoader has been heavily promoted on YouTube and Discord, with the operators even inviting content creators to promote it on their blogs/videos for a fee. Stealing a ton of data Kaspersky comments that Arcane's broad data theft makes it stand out in the populous infostealer space. First, it profiles the infected system, stealing hardware and software details such as OS version, CPU and GPU details, installed antivirus, and browsers. The current version of the malware targets account data, settings, and configuration files from the following apps: Arcane also captures screenshots that can reveal sensitive information about what you are doing on the computer and retrieves saved Wi-Fi network passwords. Even though Arcane currently has specific targeting, its operators could expand it to cover additional countries or themes. Becoming infected with an infostealer is devastating, leading to financial fraud, extortion, and future attacks. Cleaning up after these attacks is a massive time sink as you need to change the passwords on every website and application you use and ensure they are not compromised. Therefore, users should always keep in mind the risks of downloading unsigned pirate and cheat tools. The risk from these tools is too high, and they should be avoided entirely. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // New Arcane Malware Targets Gamers via YouTube and Discord

Arcane, a newly identified infostealer malware, exploits game cheats and cracks on platforms like YouTube and Discord to compromise user data.

Unlike its namesake, Arcane Stealer V, this new malware shows no code similarities or direct connections to its predecessor.

The malware operates by deceiving users into downloading malicious files through fake game cheats, subsequently disabling Windows Defender to avoid detection.

Most infections have been reported in Russia, Belarus, and Kazakhstan, which is unusual given that Russian-based cyber actors generally avoid attacking these regions.

Arcane targets information from VPNs, gaming platforms, messaging applications, and web browsers, extracting sensitive data such as account credentials and Wi-Fi passwords.

Recent developments in the malware's distribution include ArcanaLoader, an allegedly legitimate downloader for popular game cracks promoted across social media.

Kaspersky emphasizes the extensive data theft achieved by Arcane, making it a significant threat among infostealers.

The report warns of the severe consequences of infostealer infections, including financial fraud and the substantial effort required to mitigate damage post-attack.