Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

Prediction markets are ditching the 'casino' label to become a regular part of how people track the news

May 2, 2026

Altura Enables On-chain Lending With AVLT on Morpho

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»New Phishing Attack Uses Sophisticated Infostealer Malware
New Phishing Attack Uses Sophisticated Infostealer Malware
Security

New Phishing Attack Uses Sophisticated Infostealer Malware

March 5, 2026No Comments3 Mins Read

A new sophisticated phishing attack featuring a stealthy infostealer malware that exfiltrates a wide range of sensitive data has been uncovered by threat analysts. 

This malware not only targets traditional data types like saved passwords but also includes session cookies, credit card information, Bitcoin-related extensions and browsing history.

The collected data is then sent as a zipped attachment to a remote email account, highlighting a significant shift in infostealer capabilities.

Attack Methodology

According to an advisory published by Barracuda Networks, the attack begins with a phishing email that entices recipients to open an attached purchase order file. 

These emails, characterized by grammatical errors, appear from a fake address. The attachment contains an ISO disc image file, a precise replica of data from optical discs like CDs or DVDs. Embedded within this image file is an HTA (HTML Application) file, which enables the execution of applications on the desktop without the security limitations of a browser.

Upon executing the HTA file, a sequence of malicious payloads is activated. This sequence starts with the download and execution of an obfuscated JavaScript file from a remote server, which then triggers a PowerShell file that retrieves a ZIP file from the same server.

The ZIP file contains a Python-based infostealer malware.

This malware briefly operates to collect data and then deletes all files, including itself, to avoid detection.

Malware Capabilities and Data Exfiltration

The infostealer is engineered to collect comprehensive browser information and files. 

It extracts MasterKeys from browsers such as Chrome, Edge, Yandex and Brave, and captures session cookies, saved passwords, credit card information and browser histories. Additionally, the malware copies data from Bitcoin-related browser extensions, including MetaMask and Coinbase Wallet.

See also  Crypto attorney says Drift incident may qualify as 'civil negligence'

The malware targets PDF files and zips entire directories, including those in the Desktop, Downloads, Documents and specific %AppData% folders. The stolen data is then emailed to various addresses at the domain maternamedical.top, each designated for specific types of information like cookies, PDF files and browser extensions.

Read more on cybersecurity threats to businesses: Supply Chains Remain Hidden Threat to Business

Implications for Cybersecurity

According to Barracuda, this attack represents a new frontier in data exfiltration threats, with the malware’s wide range of data collection capabilities posing severe risks. 

“Most phishing attacks are associated with data theft, but here we are looking at an attack designed for extensive data exfiltration executed by a sophisticated infostealer,” said Saravanan Mohan, manager of threat analyst at Barracuda.

“The amount and range of sensitive information that can be taken is extensive. Some can potentially be leveraged in further malicious activity, such as lateral movement or financial fraud. As cyber-criminals continue to develop sophisticated methods to steal critical information, it’s important for businesses to stay vigilant and proactive in their cybersecurity efforts.”

Key strategies recommended by the firm include implementing robust security protocols, continuous monitoring for suspicious activities and employee education on potential threats. 

Multi-layered email protection solutions utilizing AI and machine learning are also helpful in detecting and blocking such phishing attempts before they reach user inboxes.

Source link

attack Infostealer Malware Phishing Sophisticated

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Former OpenSea Executive Accused of Links to AnubisDAO Rug Pull

October 10, 2023

Sam Bankman-Fried Guilty on All 7 Counts in FTX Fraud Trial: Reuters

November 3, 2023

Agglayer Clears $200M Post‑Hack With Zero Incidents, Credits ZK Proof Security

April 25, 2026

Type above and press Enter to search. Press Esc to cancel.