Summary
- Zscaler discovered a new information stealer called Statc Stealer.
- Statc Stealer is a sophisticated malware targeting Windows devices to steal sensitive information.
- The malware disguises itself as authentic Google ads (and .mp4 file) to infect systems.
- Stealing capabilities include data from web browsers, crypto wallets, credentials, and messaging apps including Telegram.
- Statc Stealer uses C++ code, evasion techniques, and encryption to hide its actions.
- The attack chain involves malvertising, dropper, downloader files, and PowerShell scripts.
- Stolen data is encrypted and sent to a command-and-control (C&C) server.
- Popular Windows browsers like Chrome, Edge, Brave, and others are targeted.
This is, as always from those anti-malware, blown up to sound scary. But this is run-of-the-mill malware, that might be of interest academically because of implementation details, but that’s it.
It’s still normal malware that requires a user executing a file they don’t know where it came from, and probably (article is unclear, and the links have probably been taken down) also giving it admin access.
You don’t need admin access to do a lot of damage on a windows system. From the user space, a malware can:
See this same class of malware at (unfortunate link, but you can see the detailed discussions there): https://www.reddit.com/r/Bitwarden/comments/14r29p6/meduza_stealer_will_steal_on_windows_browser/
The discussion doesn’t actually add much (as it’s people without any extra knowledge), but the linked article there mentions the ability to bypass UAC