#Stealc
Check Point's @Tera0017 analyses the YouTube Ghost Network, a collection of malicious accounts that take advantage of YouTube’s features to distribute infostealers like Lumma, Rhadamanthys, StealC, RedLine, 0debug & other Phemedrone variants. research.checkpoint.com/2025/youtube...
October 27, 2025 at 10:10 AM
Doxxing of alleged Lumma Stealer operators and compromised Telegram accounts coincided with a steep fall in sample detections and C2 activity; customers shifted to Vidar and StealC. #lumma_stealer #water_kurita #doxxing https://bit.ly/46Z8SyJ
October 19, 2025 at 6:03 PM
🚨 Cyber Alert: Lumma Stealer Operators Doxxed
An underground exposure campaign revealed identities tied to Lumma Stealer (Water Kurita), leading to:
📉 Decline in malware activity
🔄 Customer migration to Vidar, StealC, Amadey
⚡ Rising underground competition and innovation

#CyberSecurity #Malware
October 18, 2025 at 3:49 PM
~Trendmicro~
A doxxing campaign against alleged Lumma Stealer (Water Kurita) operators has caused a sharp decline in activity, with customers migrating to alternatives like Vidar and StealC.
-
IOCs: (None identified)
-
...
Lumma Stealer Doxxing Leads to Decline
www.trendmicro.com
October 16, 2025 at 12:34 PM
Notícia da BleepingComputer

"New FileFix attack uses steganography to drop StealC malware" #bolhasec
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware.
www.bleepingcomputer.com
October 12, 2025 at 5:30 PM
The One LinkedIn Hack You Can’t Afford to Ignore: Inside the Stealc Malware Onslaught

Introduction: A sophisticated malware campaign is weaponizing LinkedIn, using fake job offers to deliver the powerful Stealc information stealer. This multi-faceted threat exemplifies the modern attack chain,…
The One LinkedIn Hack You Can’t Afford to Ignore: Inside the Stealc Malware Onslaught
Introduction: A sophisticated malware campaign is weaponizing LinkedIn, using fake job offers to deliver the powerful Stealc information stealer. This multi-faceted threat exemplifies the modern attack chain, harvesting everything from browser passwords to cryptocurrency wallets, leaving compromised systems utterly defenseless. Understanding its mechanics is no longer optional for cybersecurity professionals. Learning Objectives: Decode the infection chain of Stealer-as-a-Service (SaaS) malware like Stealc.
undercodetesting.com
October 7, 2025 at 2:27 PM
New Filefix Attack Targets Meta Accounts With Fake Security Warnings

New FileFix Attack Targets Meta Accounts With Fake Security Warnings: StealC Malware Hits U.S. Users Hard in 2025 Phishing Surge Picture this: Your phone buzzes with a dire alert—your Facebook account faces suspension in seven…
New Filefix Attack Targets Meta Accounts With Fake Security Warnings
New FileFix Attack Targets Meta Accounts With Fake Security Warnings: StealC Malware Hits U.S. Users Hard in 2025 Phishing Surge Picture this: Your phone buzzes with a dire alert—your Facebook account faces suspension in seven days unless you act now. In a panic, you click, only to unleash a digital thief that plunders your credentials, crypto wallets, and cloud secrets.
bhulekhup.in
October 3, 2025 at 3:41 PM
The Intrinsec team looks into Acreed, an infostealer that's gaining traction among cybercriminals & has potential to overtake the number one stealer, Lumma, in the future. Acreed uses the BNB Smartchain Testnet & the Steam platform as dead drop resolvers. www.intrinsec.com/analysis-of-...
September 30, 2025 at 9:16 AM
FileFix Attack Uses Fake Meta Suspensions to Spread StealC Malware #ClickFix #CyberAttacks #CyberThreat
FileFix Attack Uses Fake Meta Suspensions to Spread StealC Malware
 A new cyber threat known as the FileFix attack is gaining traction, using deceptive tactics to trick users into downloading malware. According to Acronis, which first identified the campaign, hackers are sending fake Meta account suspension notices to lure victims into installing the StealC infostealer. Reported by Bleeping Computer, the attack relies on social engineering techniques that exploit urgency and fear to convince targets to act quickly without suspicion.  The StealC malware is designed to extract sensitive information from multiple sources, including cloud-stored credentials, browser cookies, authentication tokens, messaging platforms, cryptocurrency wallets, VPNs, and gaming accounts. It can also capture desktop screenshots. Victims are directed to a fake Meta support webpage available in multiple languages, warning them of imminent account suspension. The page urges users to review an “incident report,” which is disguised as a PowerShell command. Once executed, the command installs StealC on the victim’s device.  To execute the attack, users are instructed to copy a path that appears legitimate but contains hidden malicious code and subtle formatting tricks, such as extra spaces, making it harder to detect. Unlike traditional ClickFix attacks, which use the Windows Run dialog box, FileFix leverages the Windows File Explorer address bar to execute malicious commands. This method, attributed to a researcher known as mr.fox, makes the attack harder for casual users to recognize.  Acronis has emphasized the importance of user awareness and training, particularly educating people on the risks of copying commands or paths from suspicious websites into system interfaces. Recognizing common phishing red flags—such as urgent language, unexpected warnings, and suspicious links—remains critical. Security experts recommend that users verify account issues by directly visiting official websites rather than following embedded links in unsolicited emails.  Additional protective measures include enabling two-factor authentication (2FA), which provides an extra security layer even if login credentials are stolen, and ensuring that devices are protected with up-to-date antivirus solutions. Advanced features such as VPNs and hardened browsers can also reduce exposure to such threats.  Cybersecurity researchers warn that both FileFix and its predecessor ClickFix are likely to remain popular among attackers until awareness becomes widespread. As these techniques evolve, sharing knowledge within organizations and communities is seen as a key defense. At the same time, maintaining strong cyber hygiene and securing personal devices are essential to reduce the risk of falling victim to these increasingly sophisticated phishing campaigns.
dlvr.it
September 24, 2025 at 2:53 PM
📢 Campagne malware sur Steam: patch malveillant de BlockBlasters déploie StealC et un backdoor
📝 Selon G DATA (blog), une campagne sophistiquée a co…
https://cyberveille.ch/posts/2025-09-22-campagne-malware-sur-steam-patch-malveillant-de-blockblasters-deploie-stealc-et-un-backdoor/ #IOC #Cyberveille
September 24, 2025 at 2:00 AM
Compromising Steam games in order to infect players with infostealers.

Not surprised, not the first time nor the last time this will happen. Final payload will install StealC stealer malware and a Python-compiled backdoor […]
Original post on swecyb.com
swecyb.com
September 22, 2025 at 7:38 AM
新型FileFix攻击利用隐写术传播Stealc恶意软件

研究人员警告,新出现的FileFix攻击活动正通过隐写术在文件中隐藏Stealc恶意软件,普通安全检测难以发现,提醒用户加强防范措施。

📰 https://psa.ngo/news/filefix-steganography-spreads-stealc-malware/
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware.
www.bleepingcomputer.com
September 19, 2025 at 8:10 PM
FileFix attacks are surging—masquerading as Facebook security alerts to trick users into executing StealC infostealers via fake PDF links. Social engineering just got smarter. 📄🎭 #FileFixCampaign #StealCInfostealer
FileFix attacks trick victims into executing infostealers
: Tech evolved from PoC to global campaign in under two months
buff.ly
September 19, 2025 at 3:06 PM
Facebook Faux Pas: How StealC Malware Takes a New Phishing Path to Your Data!

Beware of FileFix! Cybersecurity researchers spot a clever phishing campaign using fake Facebook pages to spread StealC malware. Stay cautious and protect your data.
thenimblenerd.com?p=1055220
Facebook Faux Pas: How StealC Malware Takes a New Phishing Path to Your Data!
Cybersecurity researchers at Acronis have uncovered a phishing campaign using FileFix to spread the StealC infostealer. Victims are tricked into executing malicious code through a fake Facebook Security page. This campaign proves that even internet scammers are getting more sophisticated, offering multilingual support like a nefarious version of Google Translate.
thenimblenerd.com
September 18, 2025 at 12:24 PM
FileFixの新しい攻撃はステガノグラフィーを使用してStealCマルウェアをドロップします

New FileFix attack uses steganography to drop StealC malware #BleepingComputer (Sep 16)

www.bleepingcomputer.com/news/securit...
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware.
www.bleepingcomputer.com
September 17, 2025 at 10:45 PM
Ongoing FileFix Attack Installs StealC Infostealer Via Fake Facebook Pages

Researchers spot FileFix phishing sites that deliver StealC Infostealer through fake Facebook warnings and hidden payloads in images.

#hackernews #news
Ongoing FileFix Attack Installs StealC Infostealer Via Fake Facebook Pages
Researchers spot FileFix phishing sites that deliver StealC Infostealer through fake Facebook warnings and hidden payloads in images.
hackread.com
September 17, 2025 at 6:00 PM
New Innovative FileFix Attack in The Wild Leverages Steganography to Deliver StealC Malware
New Innovative FileFix Attack in The Wild Leverages Steganography to Deliver StealC Malware
cybersecuritynews.com
September 17, 2025 at 1:58 PM
🚩 FileFix Campaign Uses Steganography to Deploy StealC Infostealer Through Facebook Security Lures Acronis Threat Research Unit researchers discovered an active FileFix campaign that represents ...

#TIGR #malware

Origin | Interest | Match
Awakari App
awakari.com
September 17, 2025 at 3:15 PM
📌 FileFix Phishing Campaign Distributes StealC Infostealer via Fake Facebook Alerts and Image-Based Payloads https://www.cyberhub.blog/article/13274-filefix-phishing-campaign-distributes-stealc-infostealer-via-fake-facebook-alerts-and-image-based-payloads
FileFix Phishing Campaign Distributes StealC Infostealer via Fake Facebook Alerts and Image-Based Payloads
Researchers have identified a sophisticated phishing campaign involving sites named FileFix that distribute the StealC Infostealer malware. The attackers are utilizing fake Facebook alerts and concealing malicious payloads within images to evade detection. This attack leverages advanced social engineering techniques to deceive users into downloading malicious files. The FileFix sites are designed to mimic legitimate Facebook pages, employing fake alerts to entice users into clicking on malicious links. The payloads are embedded within image files, a technique known as steganography, which helps bypass traditional security measures that may not thoroughly inspect image files. The StealC Infostealer is engineered to exfiltrate sensitive information, including login credentials and financial data, from compromised systems. This attack underscores the evolving nature of phishing techniques, where attackers continually adapt to bypass security measures. For cybersecurity professionals, this incident highlights the critical importance of user education and awareness training to recognize and avoid phishing attempts. Additionally, implementing advanced threat detection systems capable of inspecting image files for hidden payloads can enhance defense mechanisms. Regular security audits and updates are also essential to protect against emerging threats. The use of social engineering and steganography in this attack demonstrates the sophistication of modern cyber threats, necessitating a multi-layered defense strategy that combines technical measures with user awareness. The FileFix phishing campaign represents a significant evolution in the tactics used by cybercriminals to distribute malware. By leveraging fake Facebook alerts, attackers exploit the trust users place in social media platforms. The use of steganography to hide payloads within images adds a layer of complexity to the attack, making it more challenging for traditional security measures to detect and block the malicious content. The StealC Infostealer is particularly concerning due to its ability to exfiltrate a wide range of sensitive information. This includes not only login credentials and financial data but also personal information that can be used for further malicious activities, such as identity theft. The malware's stealthy nature allows it to operate undetected for extended periods, increasing the potential damage to affected users. For cybersecurity professionals, this attack serves as a reminder of the importance of a multi-layered defense strategy. User education and awareness training are crucial components, as they help users recognize and avoid phishing attempts. However, technical measures are equally important. Advanced threat detection systems that can inspect image files for hidden payloads are essential for detecting and blocking these types of attacks. Regular security audits and updates can help ensure that systems are protected against the latest threats. The use of social engineering and steganography in this attack highlights the sophistication of modern cyber threats. Attackers are continually finding new ways to bypass security measures and trick users into downloading malicious files. As such, cybersecurity professionals must remain vigilant and adapt their defense strategies to keep pace with evolving threats. In conclusion, the FileFix phishing campaign and the distribution of the StealC Infostealer underscore the need for a comprehensive approach to cybersecurity. By combining user education with advanced technical measures, organizations can better protect themselves against these sophisticated attacks.
www.cyberhub.blog
September 17, 2025 at 1:20 PM
New Innovative FileFix Attack in The Wild Leverages Steganography to Deliver StealC Malware A sophisticated cyberthreat campaign has emerged that represents a significant evolution in social engine...

#cyberf="/hashtag/Cyber" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Cyber #security/hashtag/Security" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#Security #newsef="/hashtag/News" class="hover:underline text-blue-600 dark:text-sky-400 no-card-link">#News #Threats #cyber #security #cyber #security #news

Origin | Interest | Match
New Innovative FileFix Attack in The Wild Leverages Steganography to Deliver StealC Malware
New FileFix campaign hides StealC payloads in JPGs, using HTML file uploads and steganography to bypass traditional defenses.
cybersecuritynews.com
September 17, 2025 at 1:59 PM
Un PoC FileFix devient campagne active : une fausse alerte Facebook piège l’Explorateur via PowerShell pour livrer StealC, voler mots de passe et cryptos. Ne copiez aucun chemin, vérifiez via votre compte et activez vos antivirus et bloqueur de scripts 🔒🛡️.
Ne copiez surtout pas ce faux lien Facebook, vos cryptos et mots de passe sont en jeu
Démontré en juillet comme simple preuve de concept, l’exploit FileFix est désormais utilisé dans une vraie campagne de phishing pour diffuser StealC et dérober vos données sensibles.
www.clubic.com
September 17, 2025 at 12:15 PM
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware.
"The observed campaign u…

#hackernews #news
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad
thehackernews.com
September 17, 2025 at 9:09 AM
'FileFix' attacks use fake Facebook security alerts to trick victims into running infostealers

Tech evolved from PoC to global campaign in under two months
An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC in…

#hackernews #news
'FileFix' attacks use fake Facebook security alerts to trick victims into running infostealers
Tech evolved from PoC to global campaign in under two months An attack called FileFix is masquerading as a Facebook security alert before ultimately dropping the widely used StealC infostealer and malware downloader.…
go.theregister.com
September 17, 2025 at 8:27 AM
New FileFix attack uses steganography to drop StealC malware

A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware. [...]

#hackernews #meta #news
New FileFix attack uses steganography to drop StealC malware
A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into unknowingly installing the StealC infostealer malware. [...]
www.bleepingcomputer.com
September 17, 2025 at 7:56 AM