New malware tracked as Mars stealer
Morphisec Labs recently discovered the Mars stealer that was spreading masqueraded as malicious software cracks and keygens.
The Mars stealer is available for sale on several underground forums, researchers pointed out that it is under constant development. The malicious code was offered only $160 for a lifetime subscription.
The malicious code allows stealing user credentials stored in various browsers, as well as many different cryptocurrency wallets. Researchers discovered that threat actors released a cracked version of the Mars Stealer along with a guide that tricked its users into improperly configuring it allowing them to access their data. Stolen data are then offered for sale on cybercrime marketplaces.
“Not long after the Mars Stealer’s release, a cracked version was released with an instruction document. This guide has some flaws. One flaw instructs users to set up full access (777) to the whole project, including the victims’ logs directory.” reads the analysis published by Morphisec.
“Whoever released the cracked Mars Stealer without official support has led threat actors to improperly configure their environment, exposing critical assets to the world.”
The malware is based on the Oski Stealer and it was first spotted in June 2021.
The malware targets multiple cryptocurrency wallets, the most stolen plugin using Mars Stealer is the crypto wallet MetaMask, followed by Coinbase.
Most of the victims are students, faculty members, and content makers looking for legitimate applications who end up with tainted ones instead.
Abuse of Google ads
Threat actors used Google Ads to trick victims searching for the original software into visiting a malicious site instead. They used stolen information to pay advertising campaigns.
The researchers discovered that threat actors compromised their own system with the Mars Stealer while debugging. Researchers were able to analyze the operation by looking at attackers own stolen information, including screenshots, passwords, history, system information, etc.
The information revealed by the bad OPSEC, allowed Morphisec to analyze the Mars stealer to a Russian national.
“We can safely attribute this actor as a Russian national by looking at the screenshots and keyboard details from the extracted system.txt.” concludes the report that includes Indicators of Compromise.
The post Bad OPSEC allowed researchers to uncover Mars stealer operation￼￼￼￼ appeared first on Security Affairs.