Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware

Pietro Melillo : 26 June 2024 07:45

Introduction Xehook Stealer is a sophisticated malware targeting Windows operating systems, first discovered in January 2024. Within a year, Xehook has rapidly gained notoriety for its advanced data collection capabilities and support for over 110 cryptocurrencies and 2FA extensions.

Starting today, the future of the project may undergo a significant change, as two sales announcements have been found for the project, one on the well-known forum xss.is and the other on its own Telegram channel.

Technical Features Xehook Stealer is written in .NET and stands out for its dynamic data collection capabilities from Chromium and Gecko-based browsers. Key features include:

  • Collection of Sensitive Data: Passwords, cookies, autofill information, and credit card data from browsers. It also supports sessions from messaging platforms like Telegram and Discord.
  • Cryptocurrency Support: Compatible with over 110 cryptocurrencies and various 2FA extensions.
  • Custom Traffic Bots: Includes an API for creating custom traffic bots.
  • Google Cookie Retrieval: A feature for retrieving expired Google cookies.
  • Real-Time Notification Interface: Integration with Telegram for real-time notifications.

Acquista il corso Dark Web & Cyber Threat Intelligence (e-learning version)
Il Dark Web e la Cyber Threat Intelligence rappresentano aree critiche per comprendere le minacce informatiche moderne. Tra ransomware, data breach e attività illecite, le organizzazioni devono affrontare sfide sempre più complesse per proteggere i propri dati e le infrastrutture. Il nostro corso “Dark Web & Cyber Threat Intelligence” ti guiderà attraverso i meccanismi e le strategie utilizzate dai criminali informatici, fornendoti competenze pratiche per monitorare, analizzare e anticipare le minacce.

Accedi alla pagina del corso condotto dall'Prof. Pietro Melillo sulla nostra Academy e segui l'anteprima gratuita.

Per un periodo limitato, potrai utilizzare il COUPON CTI-16253 che ti darà diritto ad uno sconto del 20% sul prezzo di copertina del corso
Per ulteriori informazioni, scrivici ad [email protected] oppure scrivici su Whatsapp al 379 163 8765 

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

Distribution Methods Xehook Stealer is distributed through various vectors, including:

  • Drive-By Downloads: Hidden and deceptive downloads from compromised websites.
  • Spam Mail: Malicious attachments or links in emails, direct messages, and SMS.
  • Questionable Download Sources: Free file hosting sites, P2P networks, illegal activation tools, and fake updates.
  • Local Network Propagation: Can self-spread via removable storage devices and local networks.

Dump of Several Malware Stealer Samples by Country

Content of Data Captured by the Malware

Announcement on XSS.is Forum The Xehook project sale post also appeared on the well-known forum xss.is.

After a few hours, the post was removed, likely because the project was sold. This rapid change indicates strong interest and the possible transition to a new owner, which could lead to further developments in the threat landscape.

Announcement on Telegram Channel

In a recent post on their Telegram channel, written in Russian, the Xehook developers announced the sale of the project.

The message reads: “Attention! The project is in the process of being sold. We have been together with you for a year, but it’s time to move on. I decided to sell the Xehook project entirely to a person who will support and improve it. The reason for the sale is the loss of interest in developing and improving the project, for which I sincerely apologize. The new owner’s contact details will be published shortly.”

Translation

“Attention! The project is in the process of being sold. We have been together with you for a year, but it’s time to move on. I have decided to sell the Xehook project entirely to a person who will support and improve it. The reason for the sale is the loss of interest in developing and improving the project, for which I sincerely apologize. The new owner’s contact details will be published shortly.”

The Infostealer Phenomenon Infostealers like Xehook represent a particularly dangerous category of malware designed to steal sensitive information from infected users. In 2023, infostealer attacks increased significantly, with a 40% rise compared to the previous year. This type of malware is responsible for compromising millions of accounts and exfiltrating a wide range of personal and financial data. The figures related to infostealers highlight the extent of the problem:

  • Attack Numbers: Over 100 million infostealer attacks were recorded in 2023 alone.
  • Compromised Data: Infostealers have stolen over 10 billion data records, including login credentials, banking information, and personal data.
  • Financial Losses: Global losses due to infostealers are estimated in billions of dollars, with devastating consequences for both individual and corporate victims.

These numbers underscore the need for strengthened security measures and increased awareness of the threats posed by infostealers.

Implications of the Announcement This announcement marks a significant turning point for the future of Xehook. The sale of the project could lead to changes in the management and development of the malware. Users and potential victims need to be aware of any new developments or variants of the malware that may emerge under new management.

Conclusion Xehook Stealer represents an advanced threat in the cybercrime landscape, with sophisticated capabilities that facilitate its spread and effectiveness. The recent announcement of the project’s sale adds another layer of uncertainty regarding its future. It is essential to remain vigilant and adopt adequate security measures to protect against this type of threat.

Pietro Melillo
Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities. Leads the CTI Team "RHC DarkLab"