Cybercriminals Team Up to Upgrade SapphireStealer Malware

  /     /     /  
Publicated : 23/11/2024   Category : security


Cybercriminals Team Up to Upgrade SapphireStealer Malware


A hacker published a real gem of an infostealer to GitHub that requires zero coding knowledge to use. Then a community sprung up around it, polishing the code to a high shine and creating new, even more robust features.



Cybercriminals are mining the capabilities of an 
open source
 infostealer called SapphireStealer, developing a legion of variants that are helping to democratize the cybercrime landscape when it comes to carrying out data-theft attacks. 
Ever since a hacker first published it onto the public Web late last year, hackers have been adopting SapphireStealer, tinkering with it, and releasing new versions into public repositories. It has created a reinforcing feedback loop where the malware keeps getting stronger, and more attackers are being drawn to it, potentially leading to more dangerous consequences downstream.
Youve got a large group of threat actors that are interested in stealing credentials, access tokens, username, passwords, says Edmund Brumaghin, threat researcher for Cisco Talos, who
on Aug. 31 published a blog post
about SapphireStealer and its many contributors. Then theyre monetizing that data, which can lead to higher-impact types of attacks.
On Christmas Day, 2022, children across the world ran downstairs to open up presents from Santa. Partners opened gifts from their significant others. And on GitHub, cybercriminals were treated to a present of their own: A simple stiller [sic] with sending logs to your EMAIL, courtesy of r3vengerx0.
The stiller (stealer) was written in .NET, and free for anyone to download. Simple but effective, it gave even non-technical hackers the ability to grab files in most popular formats — .pdf, .doc, .jpg, etc. — as well as screenshots, and credentials from Chromium browsers like Google Chrome, Microsoft Edge, and Yandex. It simply packaged this information into an email, and sent it back to adversaries along with various information about the targeted machine: IP address, OS version, and so on. Finally, post-exfiltration, SapphireStealer deletes evidence of its activity and terminates.
This was all well and good but, like r3vengerx0s GitHub listing, there were kinks to work out. There was some superfluous code execution flow taking place — superfluous instructions that werent exactly what you would expect from an efficient codebase. There were also some typographical errors in certain points in the code, Brumaghin explains.
That began to change, starting around mid-January.
Soon after the holidays, new variants of SapphireStealer started to emerge, which cleaned up (if not significantly refactored) the code, and improved on its core functionality. Some variants, for example, extended the list of file formats SapphireStealer could draw from.
Another variant replaced the email function with the Discord webhook API. Several others popped up with the ability to alert attackers to new infections by transmitting log data via a Telegram API.
Through the first half of 2023, SapphireStealer became more robust, multifaceted, and dangerous but also more accessible. The barrier to entry for getting into information stealing continues to decrease with the introduction of open source stealers like SapphireStealer. You dont need to know how to code. You dont need to know operational security or anything like that, Brumaghin says.
As SapphireStealer grows and spreads, it could easily enable more serious attacks for larger enterprises. 
An organization might not treat an information stealer threat at the same level as another threat like, lets say, ransomware, Brumaghin explains. But theyre often a precursor to things like ransomware and espionage, because an adversary will obtain credentials with an information stealer and then monetize those by selling them to other threat actors that can then use that access to conduct post-compromise activities, working towards some of their longer-term mission objectives.
He concludes: Organizations need to be aware of that relationship. These threats in a lot of ways are becoming more interlinked, as the cybercrime economy continues to mature and grow.

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cybercriminals Team Up to Upgrade SapphireStealer Malware