Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Target Windows Machines with New Data-Stealing Malware
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Target Windows Machines with New Data-Stealing Malware

Highlights

  • Fickle Stealer targets Windows machines to steal sensitive data.

  • It uses Rust and sophisticated anti-detection techniques.

  • Advanced security measures are essential to counter such threats.

Ethan Moreno
Last updated: 20 June, 2024 - 11:16 am 11:16 am
Ethan Moreno 11 months ago
Share
SHARE

Fortinet cybersecurity experts have detected a surge in attacks on Windows systems by a sophisticated malware known as Fickle Stealer. Utilizing the Rust programming language, Fickle Stealer is capable of evading detection and infiltrating systems without raising alarms. It uses various delivery methods, including VBA dropper, VBA downloader, Link downloader, and Executable downloader, to penetrate target systems.

Contents
Fickle Stealer’s MechanismData Exfiltration and Targeting

Fickle Stealer’s Mechanism

The malware initiates its attack chain by preparing PowerShell scripts designed to bypass User Account Control (UAC). It does this by creating scheduled tasks, injecting code into executables, and communicating with its command and control (C2) server through Telegram. These scripts allow Fickle Stealer to blend in with legitimate software on the infected machine.

Once embedded, Fickle Stealer creates a mutex and performs several anti-analysis checks to avoid detection. These checks include detecting debuggers, analyzing process names, examining loaded modules, and identifying virtual machines. If these checks pass, the malware replicates itself in the system’s Temp folder. The replica then establishes communication with the C2 server, which responds with an encrypted list of target data such as cryptocurrency wallets and sensitive files.

Data Exfiltration and Targeting

Fickle Stealer meticulously searches common installation directories for sensitive data and compresses the stolen information using Deflate. It then encodes the data in a specific JSON format before exfiltrating it to the C2 server. This mechanism allows the malware to target a wide range of applications and update its target list dynamically as new malware variants are developed.

Cybersecurity researchers stress the importance of robust security solutions to monitor and protect against evolving threats. Fortinet’s detailed report sheds light on Fickle Stealer’s capabilities and emphasizes the need for continuous vigilance and advanced protective measures.

When comparing this recent discovery with past incidents, it is evident that Fickle Stealer’s use of Rust and sophisticated anti-detection techniques marks a significant evolution in malware development. Previous data stealers primarily relied on simpler methods and were easier to detect and neutralize. This new variant’s ability to evade detection and dynamically update its target list makes it a formidable threat.

Moreover, the use of Telegram for C2 communication adds another layer of complexity. Earlier malware versions typically used more conventional communication channels, which were more straightforward to intercept and disrupt. Fickle Stealer’s innovative use of modern communication platforms demonstrates the evolving tactics of cybercriminals seeking to bypass traditional security measures.

Addressing the risk of advanced malwares like Fickle Stealer involves adopting proactive cybersecurity measures. Users and organizations should employ comprehensive security solutions capable of detecting and neutralizing threats in real time. Regular updates and patches to software systems are crucial in minimizing vulnerabilities. Fortinet’s report highlights the importance of staying informed about the latest cybersecurity threats and the defensive measures needed to combat them.

To effectively combat Fickle Stealer, cybersecurity strategies must evolve to match the sophistication of the threats. Implementing multi-layered security protocols, educating users about phishing and social engineering tactics, and maintaining updated security systems are essential steps. As cyber threats continue to advance, the collaboration between cybersecurity researchers and organizations becomes increasingly vital in safeguarding sensitive data and maintaining the integrity of digital infrastructures.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

MITRE’s CVE Program Faces Funding Shake-up and Future Alternatives

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Apple Unveils Live Audio Transcriptions in Notes App
Next Article Apple Watch Unveils Offline Routes Tool in watchOS 11

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Upcoming NVIDIA RTX 5060 Pricing Leaked Ahead of Launch
Computing
Tesla Hires Operators to Develop Optimus Robot
Electric Vehicle
Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?