EHA
Home Chrome Flesh Stealer Malware Targeting Chrome, Firefox, and Edge Users for Credential Theft

Flesh Stealer Malware Targeting Chrome, Firefox, and Edge Users for Credential Theft

0

A newly identified strain of information-stealing malware, dubbed Flesh Stealer, has emerged as a significant cybersecurity threat in 2025.

This sophisticated malware targets users of popular web browsers such as Google Chrome, Mozilla Firefox, Microsoft Edge, and Opera, exploiting vulnerabilities to extract sensitive data.

First observed in August 2024, Flesh Stealer is written in C# and operates via a web-based control panel, enabling attackers to manage infected systems remotely.

Stealer Control Panel

Flesh Stealer is particularly adept at harvesting login credentials, cookies, browsing history, and even cryptocurrency wallet data from over 70 browser-based extensions.

Additionally, it can reset Google cookies to maintain persistent access to user accounts.

The malware also targets messaging platforms like Signal and Telegram by extracting stored databases and chats.

Operational Sophistication

It employs encryption, Base64 obfuscation, and virtualization detection techniques to bypass traditional security tools.

The malware checks for debugging tools like Wireshark and HttpDebuggerUI and terminates its operations if such tools are detected.

Similarly, it scans for virtualized environments by analyzing system characteristics such as memory capacity, BIOS version, and active processes.

If any indicators of a sandbox or virtual machine are found, the malware halts its activity to avoid forensic analysis.

The malware is designed to avoid targeting systems in Commonwealth of Independent States (CIS) countries by evaluating installed input languages.

According to the Cyfirma, this tactic reflects a common practice among Russian-speaking developers to evade scrutiny from local authorities.

Threat Impact

Flesh Stealer systematically gathers high-value data from infected systems.

Promoting Stealer on Underground Forum

It compresses stolen information into encrypted archives before transmitting it to the attacker’s command-and-control (C2) infrastructure via secure web services.

This minimizes its network footprint and reduces the likelihood of detection by security measures.

By stealing credentials and bypassing two-factor authentication (2FA), the malware enables unauthorized access to financial platforms, email accounts, and cryptocurrency wallets.

The theft of Discord tokens further compromises private communications and facilitates additional attacks on victims’ contacts.

To combat threats like Flesh Stealer, cybersecurity experts recommend implementing robust defense mechanisms:

  • Endpoint Protection: Deploy advanced endpoint detection and response (EDR) tools to monitor suspicious activities.
  • Credential Hygiene: Enforce multi-factor authentication (MFA) and discourage password reuse.
  • Browser Hardening: Limit browser extensions to vetted plugins and restrict downloads from untrusted sources.
  • Employee Training: Conduct regular awareness programs on phishing tactics and safe browsing practices.
  • Network Monitoring: Employ behavioral analytics tools to detect anomalies indicative of malware activity.

Flesh Stealer’s modular architecture allows for continuous updates, making it a persistent threat in the evolving cybersecurity landscape.

Organizations must remain vigilant by integrating real-time threat intelligence into their security frameworks to stay ahead of such advanced malware campaigns.

Also Read:

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version