Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Using MITRE D3FEND to strengthen you home network

September 8, 2025

Speed Isn’t Everything When Buying SSDs

September 8, 2025

Debian 13.1 Released With An Initial Batch Of Fixes

September 8, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
Cyber Security

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

MichaBy MichaJune 2, 2025No Comments3 Mins Read
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data


Introduction

Cybersecurity threats evolve rapidly, and one of the latest alarming trends is the emergence of a Rust-based malware known as EDDIESTEALER. This sophisticated infostealer leverages deceptive social engineering tactics, making it crucial for tech-savvy readers to stay informed. In this article, we’ll explore how EDDIESTEALER operates, its features, and how to mitigate your risk against such threats, equipping you with vital knowledge in the cybersecurity landscape.

Understanding EDDIESTEALER: The Rise of Rust-based Malware

Recent investigations by Elastic Security Labs have unveiled a new malware campaign distributing EDDIESTEALER, an infostealer written in Rust. Using the ClickFix social engineering technique, attackers initiate this campaign via fraudulent CAPTCHA verification pages. This clever deception leads users to execute a malicious PowerShell script, which ultimately deploys the information stealer, capturing sensitive data like passwords, browser information, and cryptocurrency wallet details.

How the Attack Chain Works

The attack begins with threat actors compromising legitimate websites, injecting malicious JavaScript payloads that redirect visitors to fake CAPTCHA pages. These pages prompt users to confirm they are not a robot through a series of steps that trigger the execution of a PowerShell command. By “verifying” themselves, users inadvertently download the EDDIESTEALER malware.

Once executed, the malware retrieves the primary payload from an external server and stores it in the victim’s Downloads folder, renamed to a random 12-character file name. The malware’s capabilities include:

  • Collecting system metadata
  • Harvesting credentials from various applications
  • Establishing command and control (C2) communication

Advanced Features of EDDIESTEALER

EDDIESTEALER employs several advanced techniques to avoid detection and enhance its operational efficiency:

  • Self-deletion Mechanism: Similar to other malware like Latrodectus, EDDIESTEALER can delete its traces by renaming files using NTFS Alternate Data Streams.
  • Bypassing Browser Security: The malware can circumvent Chromium’s app-bound encryption, enabling it to access unencrypted data such as cookies, by utilizing a Rust version of the open-source tool, ChromeKatz.
  • Hard-coded Encryption Keys: Unlike other malware, the keys for client-to-server communication are hard-coded into the binary, making them less dynamic but harder to extract.

Recent Trends and Examples in Cybersecurity

The rise of EDDIESTEALER coincides with other malware campaigns like Katz Stealer targeting Windows and macOS. These threats highlight a growing trend where attackers exploit browser vulnerabilities and social engineering tactics. For example, Katz Stealer uses DLL injection methods to bypass Chrome’s security measures and exfiltrate sensitive data.

Moreover, AppleProcessHub Stealer specifically targets macOS users, aiming to harvest a range of information including bash history and SSH details. This points to a multifaceted threat landscape that demands vigilant cybersecurity practices.

Mitigating Risks Against EDDIESTEALER and Similar Threats

With the sophistication of threats like EDDIESTEALER on the rise, adopting robust cybersecurity measures is essential. Here are some actionable tips:

  • Use Multi-Factor Authentication (MFA): Enable MFA on all sensitive accounts to add an extra layer of security.
  • Regularly Update Software: Keeping your operating system, browsers, and security software updated can help defend against vulnerabilities.
  • Educate Users: Training yourself and your team on recognizing phishing attempts and suspicious activities is crucial.

FAQ

What is EDDIESTEALER?

EDDIESTEALER is a Rust-based information-stealing malware that collects sensitive data like account credentials and cryptocurrency wallet details using deceptive social engineering tactics.

How does EDDIESTEALER operate?

It operates through compromised legitimate websites that serve fake CAPTCHA verification pages, leading users to execute a malicious PowerShell script that deploys the malware.

What steps can I take to protect against EDDIESTEALER?

Utilize multi-factor authentication, keep software updated, and educate yourself and your team on recognizing phishing attacks to mitigate your risk.



Read the original article

0 Like this
AppBound Browser Bypasses Chromes data EDDIESTEALER encryption malware Steal
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleA new hybrid platform for quantum simulation of magnetism
Next Article How the Loudest Voices in AI Went From ‘Regulate Us’ to ‘Unleash Us’

Related Posts

Cyber Security

Murky Panda hackers exploit cloud trust to hack downstream customers

August 24, 2025
Cyber Security

AI-powered financial scams swamp social media

August 22, 2025
Artificial Intelligence

Data Integrity: The Key to Trust in AI Systems

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.