New Social Engineering Campaign Targets Gamers to Deliver AgeoStealer

As threat actors have begun leveraging the massive popularity of gaming to distribute a potent new credential stealer dubbed AgeoStealer4.

According to the 2025 Global Threat Intelligence Report, infostealers are now responsible for a staggering 75%-or 2.1 billion-of the 3.2 billion stolen credentials recorded in 2024, and AgeoStealer4 exemplifies how attackers are evolving both delivery mechanisms and technical sophistication to stay ahead of defenders.

Attackers Exploit Gaming Communities and Comms Platforms to Distribute Stealer Malware

Unlike previous malware campaigns that primarily relied on phishing emails, drive-by downloads, or compromised websites, AgeoStealer4 operations utilize direct contact with victims through popular communication platforms frequented by gamers.

AgeoStealer
A Blogspot webpage that is used to deliver the rar file containing AgeoStealer

Posing as game developers, malicious actors invite targets to try out a ‘new video game.’ In reality, victims are lured into downloading a compressed archive-commonly in .rar, .zip, or .7z format-purportedly containing the game.

The archive is password protected twice, not only to build a sense of legitimacy but primarily to evade detection by antivirus engines scanning for known threats.

The archive houses an NSIS installer masked as a legitimate Unity installer, which, when executed, launches a malicious Electron file that runs heavily obfuscated JavaScript code.

This layering and obfuscation serve as one of several defense evasion techniques.

AgeoStealer4 decrypts its payload at runtime, using custom routines to mask its intent and operations, further complicating signature or behavioral detection efforts.

Once installed, AgeoStealer4 immediately establishes persistence via a shortcut placed in the user’s Startup folder, ensuring it runs at each boot.

The malware then conducts a targeted scan of active system processes, focusing on browsers such as Chrome, Firefox, Edge, and Opera-chosen for their tendency to store sensitive user information such as credentials, authentication tokens, cookies, and even cryptocurrency wallet data.

Large files and documents in common directories like the desktop and downloads folders are also harvested, with the malware employing specific routines to identify high-value proprietary files.

Advanced Defense Evasion and Exfiltration Techniques Mark a New Era in Credential Theft

Advanced defense evasion is a hallmark of AgeoStealer4. The script aggressively searches for indicators of virtualized or sandboxed environments-common in malware analysis setups-and terminates processes associated with debuggers, network analysis tools, and security monitoring software using PowerShell commands.

Furthermore, it checks usernames and system paths to avoid launching in systems likely used by researchers. These tactics make manual analysis, reverse engineering, and forensic investigation extremely challenging.

According to Flashpoint Report, data exfiltration is managed through integration with GoFile.io, a legitimate file-sharing service.

Stolen information is compressed and quietly uploaded using HTTP POST requests, and attackers then retrieve download URLs either automatically or manually, reducing the need for direct contact and mitigating detection.

By blending into normal network traffic and relying on legitimate third-party infrastructure, AgeoStealer4 further evades conventional security controls.

The emergence of AgeoStealer4 reflects a broader trend in cybercrime, wherein threat groups co-opt gaming communities and their platforms for malware distribution, exploiting both trust and the lure of unreleased games.

Its combination of obfuscated code, advanced evasion, and real-time credential theft-and use of legitimate services for exfiltration-represents a significant new challenge for corporate and individual defenders alike.

Experts anticipate continuous evolution of stealer malware families like AgeoStealer4, as threat actors refine their techniques to maintain a lucrative market for stolen digital identities.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here