Stealers are designed to be stealthy primarily to avoid detection by AV tools and to remain hidden from the user.
Combination of multiple sophisticated tactics makes the stealers highly adaptable and continuously challenging for cybersecurity defenses. Not only that even threat actors also preferes stealers most due to their sophistications.
A new information-stealing malware, dubbed Glove Stealer, has been discovered in recent phishing campaigns.
This sophisticated malware employs social engineering tactics like ClickFix and FakeCaptcha to trick users into infecting their own devices.
Researchers at GenDigital discovered the campaign that typically begins with a phishing email containing an HTML attachment.
When opened, this attachment displays a fake error message, prompting users to copy and execute a malicious script. This script, often disguised as a solution to a non-existent problem, ultimately downloads and installs the Glove Stealer malware.
Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)
Glove Stealer
Glove Stealer, written in .NET, is designed to exfiltrate sensitive data from various sources:
- Web browsers (Chrome, Firefox, Edge, Brave, and others)
- 280 browser extensions
- Over 80 locally installed applications
The malware targets cryptocurrency wallets, 2FA authenticators, password managers, email clients, and other sensitive applications.
One of Glove Stealer’s most notable features is its ability to bypass App-Bound Encryption, a security measure introduced by Google in Chrome 127. The malware achieves this by using an IElevator service, a method recently disclosed by Alexander Hagenah in October 2024.
Besides this, for data exfiltration process it do the following things:-
- Terminates browser processes to access data
- Parses and stores stolen information in dedicated text files
- Collects device fingerprint data
- Compresses and encrypts the stolen data using 3DES encryption
- Sends the encrypted package to a command and control (C&C) server
While the Glove Stealer employs a supporting module named “zagent.exe” to evade the App-Bound encryption, and this module:-
- Is downloaded and executed in Chrome’s Program Files directory
- Retrieves the App-Bound encryption key from Chrome’s local state file
- Stores the decoded key in a separate file for Glove Stealer to access
The use of this module requires local admin privileges which highlights the sophisticated approach of the malware.
Glove Stealer represents a significant threat to user privacy and security. Its ability to bypass App-Bound encryption and target a wide range of sensitive data sources makes it a formidable adversary.
Users should remain vigilant against phishing attempts and avoid executing unknown scripts or following suspicious instructions, even if they appear to offer solutions to perceived problems.
IoCs
Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.