Original Article Text

Click to Toggle View

New SantaStealer malware steals data from browsers, crypto wallets. A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection. According to security researchers at Rapid7, the operation is a rebranding of a project called BluelineStealer, and the developer is ramping up the operation ahead of a planned launch before the end of the year. SantaStealer appears to be the project of a Russian-speaking developer and is promoted for a Basic, $175/month subscription, and a Premium for $300/month. Rapid7 analyzed several SantaStealer samples and obtained access to the affiliate web panel, which revealed that the malware comes with multiple data-theft mechanisms but does not rise to the advertised feature for evading detection and analysis. "The samples we have seen until now are far from undetectable, or in any way difficult to analyze," Rapid7 researchers say in a report today. "While it is possible that the threat actor behind SantaStealer is still developing some of the mentioned anti-analysis or anti-AV techniques, having samples leaked before the malware is ready for production use - complete with symbol names and unencrypted strings - is a clumsy mistake likely thwarting much of the effort put into its development and hinting at poor operational security of the threat actor(s)," Rapid7 says. The panel features a user-friendly design where 'customers' can configure their builds with specific targeting scopes, ranging from full-scale data theft to lean payloads that only go after specific data. SantaStealer uses 14 distinct data-collection modules, each running in its own thread, writing stolen data to memory, archiving it into a ZIP file, and then exfiltrating it in 10MB chunks to a hardcoded command-and-control (C2) endpoint via port 6767. The modules target information in the browser (passwords, cookies, browsing history, saved credit cards), Telegram, Discord, and Steam data, cryptocurrency wallet apps and extensions, and documents. The malware can also take screenshots of the user’s desktop. The malware uses an embedded executable to bypass Chrome’s App-Bound Encryption protections, first introduced in July 2024, and bypassed by multiple active info-stealers. Other configuration options allow its operators to exclude systems in the Commonwealth of Independent States (CIS) region and delay execution to misdirect victims with an inactivity period. As SantaStealer isn’t fully operational and hasn't been distributed en masse, it is unclear how it will spread. However, cybercriminals lately seem to prefer ClickFix attacks, where users are tricked into pasting dangerous commands into their Windows terminal. Phishing, pirated software, or torrent downloads are also common distribution methods, as are malvertising and deceptive YouTube comments. Rapid7 recommends users check links and attachments in emails they don't recognize. They also warn of running unverified code from public repositories for extensions. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.

Daily Brief Summary

MALWARE // SantaStealer Malware Targets Browsers and Cryptocurrency Wallets

SantaStealer, a new malware-as-a-service, is being marketed on Telegram and hacker forums, targeting data from browsers and cryptocurrency wallets.

Developed by a Russian-speaking individual, SantaStealer is a rebranded version of BluelineStealer, with subscriptions priced at $175/month for Basic and $300/month for Premium.

Rapid7's analysis indicates that SantaStealer lacks the advertised detection evasion capabilities, with leaked samples showing poor operational security.

The malware features 14 data-collection modules, targeting passwords, cookies, browsing history, and cryptocurrency wallets, and exfiltrates data via a hardcoded C2 endpoint.

SantaStealer's distribution methods are not fully established, but potential vectors include phishing, pirated software, and malvertising.

Rapid7 advises caution with unrecognized email links and attachments, and warns against running unverified code from public repositories.

The malware's development and marketing suggest an ongoing trend in the cybercriminal ecosystem towards sophisticated data theft operations.