{"id":90101,"date":"2024-08-16T23:37:54","date_gmt":"2024-08-17T03:37:54","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=90101"},"modified":"2024-08-16T23:37:58","modified_gmt":"2024-08-17T03:37:58","slug":"styx-stealer-malware-targets-vulnerability-to","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/styx-stealer-malware-targets-vulnerability-to\/","title":{"rendered":"Styx Stealer Malware Targets Vulnerability To Access Crypto"},"content":{"rendered":"\n<p>Styx Stealer can steal data and redirect <a href=\"https:\/\/coinscreed.com\/staging\/moonpay-partners-with-bitpay-to-streamline-crypto-transactions.html\" data-type=\"post\" data-id=\"78367\">crypto transactions<\/a> from an exposed computer to the hacker's wallet.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-1024x576.jpg\" alt=\"Styx Stealer Malware Targets Vulnerability To Access Crypto\" class=\"wp-image-71549\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-1024x576.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-300x169.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-768x432.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-750x422.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713-1140x641.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Styx Stealer Malware Targets Vulnerability To Access Crypto<\/em><\/figcaption><\/figure>\n\n\n\n<p>Cybersecurity solutions provider Check Point Research has identified a novel malware known as Styx Stealer. A mechanism known as clipping enables the newly discovered malware to pilfer an enormous amount of material, including cryptocurrency. The developer's website offers it for free on a rental basis.<\/p>\n\n\n\n<p>Since Styx Stealer is dependent on a vulnerability in Microsoft Windows Defender that was resolved last year, Windows users who have an up-to-date operating system are protected from the malware.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Styx Stealer Malware has been enhanced to facilitate theft of cryptocurrency<\/strong><\/h3>\n\n\n\n<p>The developer encountered a data breach during debugging, which led to the discovery of Styx Stealer. It is a descendant of an ancient malware known as Phemedrone Stealer. It retains the capabilities of Phemedrone Stealer, including the ability to siphon saved passwords, cookies, auto-fill data, cryptocurrency wallet data, and instant messenger sessions. Additionally, it incorporates new detection evasion techniques and includes a crypto clipper function.<\/p>\n\n\n\n<p>Malware substitutes the wallet address of a crypto recipient with that of the bad actor during a transaction, a process known as cryptocurrency clipping.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2024-08\/6cbc471f-d336-4fea-8cb2-b36f49b0c998.png\" alt=\"Styx Stealer crypto clipper user interface. Source: Check Point Research\" \/><figcaption class=\"wp-element-caption\"><em>Styx Stealer crypto clipper user interface. Source:\u00a0<a href=\"https:\/\/research.checkpoint.com\/2024\/unmasking-styx-stealer-how-a-hackers-slip-led-to-an-intelligence-treasure-trove\/?_gl=1*yq497k*_gcl_au*NTI2OTk1OTQxLjE3MjM4MzE3MjQ.\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point Research<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/em><\/figcaption><\/figure>\n\n\n\n<p>Styx Stealer was introduced in April and is available for licensing at a rate of $75 per month or $350 for a lifetime license. The pricing and features were displayed on the styxcrypter.com website until midday on Aug. 16, at which point they were substituted with information about an alternative product. Bitcoin, Litecoin, Tron, Tether, or Monero may be employed to facilitate transactions through Telegram. On YouTube, there were also videos that provided explanations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2024-08\/5f7929a7-4e46-4612-8ae3-a54a8088efee.png\" alt=\"Styx Stealer prices and features. Source: Check Point Research\" \/><figcaption class=\"wp-element-caption\"><em>Styx Stealer prices and features. Source:\u00a0<a href=\"https:\/\/research.checkpoint.com\/2024\/unmasking-styx-stealer-how-a-hackers-slip-led-to-an-intelligence-treasure-trove\/?_gl=1*yq497k*_gcl_au*NTI2OTk1OTQxLjE3MjM4MzE3MjQ.\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point Research<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/em><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Is hacking is now a profession in 2024?<\/strong><\/h3>\n\n\n\n<p>In the initial two months of its operation, the Styx Stealer developer, based in Turkey, was believed to have received approximately $9,500 in cryptocurrency as payment for the malware. Point Research identified eight wallets that were likely associated with the developer.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Are you interested in how cybercriminals are exposed? Our latest research reveals a major OpSec fail by the Styx Stealer developer, leading to critical intel that unmasked hackers behind Styx Stealer and one of the Agent Tesla campaigns.<a href=\"https:\/\/t.co\/yLUdOJEcjs\" target=\"_blank\">https:\/\/t.co\/yLUdOJEcjs<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Check Point Research (@_CPResearch_) <a href=\"https:\/\/twitter.com\/_CPResearch_\/status\/1824478552571416884?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 16, 2024<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The developer's email addresses, phone numbers, contacts, and Telegram accounts were also obtained by Check Point Research.<\/p>\n\n\n\n<p>Legitimate cryptocurrency activity is expanding at a faster pace than illicit activity, as indicated by a report published by Chainalysis on August 15. However, the value of the compromised cryptocurrency has increased. The <a href=\"https:\/\/coinscreed.com\/staging\/bitcoin-hashrate-records-recovery-as-btc-price-eyes-rebound.html\" data-type=\"post\" data-id=\"84501\">price recovery of Bitcoin<\/a> is at least partially responsible for this. The number of cybercrime incidents in 2024 has only slightly increased year over year.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Styx Stealer can steal data and redirect crypto transactions from an exposed computer to the hacker&#8217;s wallet. Cybersecurity solutions provider Check Point Research has identified a novel malware known as Styx Stealer. A mechanism known as clipping enables the newly discovered malware to pilfer an enormous amount of material, including cryptocurrency. The developer&#8217;s website offers [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":71549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[7017,3964,21335],"class_list":["post-90101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-crypto-scams","tag-cybersecurity","tag-styx-stealer"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/02\/croc_1708072859713.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/90101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=90101"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/90101\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/71549"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=90101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=90101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=90101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}