News

Stealc gets new tweaks and upgrades at least once a week. Some of its new features include a command and control (C&C) center URL randomizer, and improved logs searching and sorting system.
Stealc targets sensitive data from web browsers, extensions for cryptocurrency wallets, desktop cryptocurrency wallets and information from additional applications, ...
Stealc was built, and is being advertised, by a threat actor going by the name “Plymouth”. It is currently at version 1.3.0, and it seems to be getting new tweaks and upgrades at least once a ...
"Stealc also implements a customizable file grabber [alongside] loader capabilities that would be usually expected for an information stealer sold as a Malware-as-a-Service (MaaS)." Thanks to these ...
Stealc now targets more than 22 web browsers, 75 plugins and 25 desktop wallets, according to Bleeping Computer. Another stealer called LummaC2 can steal onetime multifactor authentication codes ...
Stealc: First analyzed by SEKOIA in February 2023, Stealc is a lightweight stealer with automated exfiltration that targets over 22 web browsers, 75 plugins, and 25 desktop wallets.
StealC allows attackers to extract data from the browser's credential store. OALabs first spotted this attack method on August 22, 2024, and dubbed it "Credential Flusher." ...
Instead, these commands initiate the download of malware such as Vidar and StealC. These are designed to harvest sensitive data, including login credentials, credit card details, and even crypto ...
G oogle’s attempt to block infostealer malware grabbing data stored in its Chrome browser seems to have been short-lived, with multiple variants claiming to have already successfully bypassed it.
ESET’s H2 2025 Threat Report explains how ClickFix is being abused by hackers to distribute some of the most popular infostealing malware, including Lumma Stealer, VidarStealer, StealC, and Danabot.