newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: New eddiestealer malware bypass Chrome’s app-bind encryption and steal browser data
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > New eddiestealer malware bypass Chrome’s app-bind encryption and steal browser data
Technology

New eddiestealer malware bypass Chrome’s app-bind encryption and steal browser data

June 2, 2025 7 Min Read
Share
New eddiestealer malware bypass Chrome’s app-bind encryption and steal browser data
SHARE

The new malware campaign uses popular Clickfix social engineering tactics launched via fake Captcha verification pages to distribute a new Rust-based information steeler called Eddiestealer.

“This campaign leverages the deceit captcha validation page, in which users run malicious PowerShell scripts that ultimately deploy Infostealer to harvest sensitive data such as credentials, browser information, cryptocurrency wallet details and more.”

The attack chain starts with a threat actor that harms a legitimate website with a malicious JavaScript payload that serves fake capture check pages.

This involves opening a Windows Run dialog prompt to a potential victim, pasting the already copied command into the “Validation Window” (i.e. the (Run) dialog), and pressing Enter. This will run the obfuscated PowerShell command and retrieve the next stage payload from the external server (“LLLL(.)FIT”).

The JavaScript payload (“gverify.js”) is then saved in the victim’s download folder and executed using cscript in a hidden window. The main goal of the interim script is to retrieve the eddiestealer binary from the same remote server and save it in the download folder with pseudo-random 12 character file names.

Written in Rust, Eddiestealer is a commodity steeler malware that can collect system metadata, receive tasks from a command and control (C2) server, and receive perspective data of interest from infected hosts. Exfiltration targets include cryptocurrency wallets, web browsers, password managers, FTP clients, and messaging apps.

“These targets may be changed because they can be configured by the C2 operator,” explained Elastic. “Eddiestealer uses standard kernel32.dll functions such as createfilew, getfilesizeex, readfile, and closehandle to read the target file.”

The collected host information is encrypted in a separate HTTP POST request after each task is completed and sent to the C2 server.

See also  How to speak ChatGpt normally

In addition to incorporating string encryption, the malware employs a custom WinAPI lookup mechanism to resolve API calls, creating Mutexes to ensure that only one version is running at any time. It also determines whether it is running in a sandboxed environment with built-in checks and, if so, removes it from disk.

“Based on similar self-exclusion techniques observed in Latrodectus, Eddiestealer can be removed via renaming NTFS alternative data streams to bypass file locks,” Elastic said.

Another notable feature built into Steeler is that it allows you to bypass chrome app-bound encryption to access unencrypted sensitive data such as cookies. This is achieved by including a Rust implementation of Chromekatz. Chromekatz is an open source tool that allows you to dump cookies and credentials from memory in a Chromium-based browser.

The Rust version of Chromekatz also includes changes to handle scenarios where the targeted Chromium browser is not running. In such cases, a new browser instance is generated using the command line argument “-window-position = -3000, -3000 https://google.com”.

When you open the browser, the purpose is to be able to read the memory associated with a child process of a Chrome network service identified by “-utility-sub-type = network.mojom.networkservice”.

Elastic said he also identified an updated version of the malware with the ability to harvest the running process, GPU information, CPU core count, CPU name, and CPU vendor. Additionally, the new variant fine-tunes the C2 communication pattern by preemptively sending host information to the server before receiving the task configuration.

That’s not all. The encryption key used for client-to-client communication is hardcoded into binary rather than dynamically retrieved from the server. Additionally, it is known that steelers will start a new Chrome process using -remote-debugging-port =. The flag that enables the DevTools protocol through the local websocket interface ensures you interact with the browser in a headless way, without the need for user interaction.

See also  Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack

“This adoption of rust in malware development reflects the growth trends of threat actors seeking to leverage modern language capabilities to improve stealth, stability and resilience over traditional analytical workflows and threat detection engines,” the company said.

This disclosure comes when C/Side reveals details about a ClickFix campaign targeting multiple platforms, including Apple MacOS, Android, and iOS, using techniques such as browser-based redirection, fake UI prompts, and drive-by download techniques.

The attack chain starts with obfuscated JavaScript hosted on a website. This leads to a download of steeler malware that, when visited from MacOS, initiates a series of redirects to pages that guide the victim to launch the terminal and run the shell script, flagging Virustotal as Atomic Macauzear (AMOS).

However, the same campaign is set up to launch a drive-by download scheme when accessing a web page from an Android, iOS or Windows device, leading to the deployment of another Trojan malware.

According to Nextron and Kandji, disclosures coincide with the emergence of new steeler families such as Katz Stealer and AppleProcesshub Stealer and AppleProcesshub Stealer respectively, allowing a wide range of information to be harvested from infected hosts.

Katz Stealer, like Eddiestealer, is designed to avoid app-bound encryption in Chrome, but is designed differently by using DLL injection to obtain an encryption key without administrator privileges and using it to decrypt encrypted cookies and passwords from Chromium-based browsers.

“Attackers hide malicious JavaScript in GZIP files, which triggers the download of PowerShell scripts when opened,” says Nextron. “This script gets a .NET-based loader payload, which injects the steeler into a legitimate process. When active, it removes stolen data to the command and control server.”

See also  Why More Security Leaders Choose AEVs

Meanwhile, AppleProcesshub Stealer is designed to remove user files such as Bash History, ZSH History, GitHub configuration, SSH information, iCloud keychain, and more.

The attack sequence that distributes the malware involves the use of Mach-O binary, which downloads two-stage Bash Stealer scripts from the server “AppleProcesshub(.)com”, and the results are returned to the C2 server. Details about the malware were first shared on May 15, 2025 by MalwareHunterTeam and last week by MacPaw’s MoonLock Lab.

“This is an example of MACH-O written in Objective-C, which communicates with commands and control servers to run scripts,” said Christopher Lopez, a researcher at Kandji.

Share This Article
Facebook Twitter Copy Link
Previous Article “Time to uninstall Google Chrome” Warns Cybersecurity Experts “Time to uninstall Google Chrome” Warns Cybersecurity Experts
Next Article Cult Classic FPS Pain Drug Returns in a Massive RTX Overhaul Cult Classic FPS Pain Drug Returns in a Massive RTX Overhaul
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app
Technology

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app

5 Min Read
How Manus AI is redefineing autonomous workflow automation across the industry
Technology

How Manus AI is redefineing autonomous workflow automation across the industry

11 Min Read
Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin
Technology

Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin

2 Min Read
Microsoft Discovery: How AI Agents Accelerate Scientific Discovery
Technology

Microsoft Discovery: How AI Agents Accelerate Scientific Discovery

9 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?