Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    iPhone 17 Pro: Apple A19 Pro Chip Could Match M4’s Performance

    June 17, 2025

    How to Fix USB Sticks Mounted as Read-Only in Linux

    June 17, 2025

    5 reasons I run my own DNS server with Unbound

    June 17, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
    Cyber Security

    New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

    MichaBy MichaJune 2, 2025No Comments3 Mins Read
    New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data


    Introduction

    Cybersecurity threats evolve rapidly, and one of the latest alarming trends is the emergence of a Rust-based malware known as EDDIESTEALER. This sophisticated infostealer leverages deceptive social engineering tactics, making it crucial for tech-savvy readers to stay informed. In this article, we’ll explore how EDDIESTEALER operates, its features, and how to mitigate your risk against such threats, equipping you with vital knowledge in the cybersecurity landscape.

    Understanding EDDIESTEALER: The Rise of Rust-based Malware

    Recent investigations by Elastic Security Labs have unveiled a new malware campaign distributing EDDIESTEALER, an infostealer written in Rust. Using the ClickFix social engineering technique, attackers initiate this campaign via fraudulent CAPTCHA verification pages. This clever deception leads users to execute a malicious PowerShell script, which ultimately deploys the information stealer, capturing sensitive data like passwords, browser information, and cryptocurrency wallet details.

    How the Attack Chain Works

    The attack begins with threat actors compromising legitimate websites, injecting malicious JavaScript payloads that redirect visitors to fake CAPTCHA pages. These pages prompt users to confirm they are not a robot through a series of steps that trigger the execution of a PowerShell command. By “verifying” themselves, users inadvertently download the EDDIESTEALER malware.

    Once executed, the malware retrieves the primary payload from an external server and stores it in the victim’s Downloads folder, renamed to a random 12-character file name. The malware’s capabilities include:

    • Collecting system metadata
    • Harvesting credentials from various applications
    • Establishing command and control (C2) communication

    Advanced Features of EDDIESTEALER

    EDDIESTEALER employs several advanced techniques to avoid detection and enhance its operational efficiency:

    • Self-deletion Mechanism: Similar to other malware like Latrodectus, EDDIESTEALER can delete its traces by renaming files using NTFS Alternate Data Streams.
    • Bypassing Browser Security: The malware can circumvent Chromium’s app-bound encryption, enabling it to access unencrypted data such as cookies, by utilizing a Rust version of the open-source tool, ChromeKatz.
    • Hard-coded Encryption Keys: Unlike other malware, the keys for client-to-server communication are hard-coded into the binary, making them less dynamic but harder to extract.

    Recent Trends and Examples in Cybersecurity

    The rise of EDDIESTEALER coincides with other malware campaigns like Katz Stealer targeting Windows and macOS. These threats highlight a growing trend where attackers exploit browser vulnerabilities and social engineering tactics. For example, Katz Stealer uses DLL injection methods to bypass Chrome’s security measures and exfiltrate sensitive data.

    Moreover, AppleProcessHub Stealer specifically targets macOS users, aiming to harvest a range of information including bash history and SSH details. This points to a multifaceted threat landscape that demands vigilant cybersecurity practices.

    Mitigating Risks Against EDDIESTEALER and Similar Threats

    With the sophistication of threats like EDDIESTEALER on the rise, adopting robust cybersecurity measures is essential. Here are some actionable tips:

    • Use Multi-Factor Authentication (MFA): Enable MFA on all sensitive accounts to add an extra layer of security.
    • Regularly Update Software: Keeping your operating system, browsers, and security software updated can help defend against vulnerabilities.
    • Educate Users: Training yourself and your team on recognizing phishing attempts and suspicious activities is crucial.

    FAQ

    What is EDDIESTEALER?

    EDDIESTEALER is a Rust-based information-stealing malware that collects sensitive data like account credentials and cryptocurrency wallet details using deceptive social engineering tactics.

    How does EDDIESTEALER operate?

    It operates through compromised legitimate websites that serve fake CAPTCHA verification pages, leading users to execute a malicious PowerShell script that deploys the malware.

    What steps can I take to protect against EDDIESTEALER?

    Utilize multi-factor authentication, keep software updated, and educate yourself and your team on recognizing phishing attacks to mitigate your risk.



    Read the original article

    0 Like this
    AppBound Browser Bypasses Chromes data EDDIESTEALER encryption malware Steal
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleA new hybrid platform for quantum simulation of magnetism
    Next Article How the Loudest Voices in AI Went From ‘Regulate Us’ to ‘Unleash Us’

    Related Posts

    Cyber Security

    BladedFeline: Whispering in the dark

    June 8, 2025
    Cyber Security

    Huge Market Opportunity for MSPs

    June 7, 2025
    Cyber Security

    Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App

    June 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.