Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Facebook X (Twitter) Instagram
Friday, April 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials
News

New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials

Team-CWDBy Team-CWDApril 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers at Varonis have uncovered a new information stealer malware (infostealer) strain that harvests browser credentials, session cookies and crypto wallets before quietly sending everything to the attacker’s server for decryption.

Called Storm, the infostealer emerged on underground cybercrime networks in early 2026.

According to Daniel Kelley, a senior security consultant at Varonis and author of a report on Storm, published on April 1, the new infostealer represents a shift in how credential theft is developing.

Initially, Kelley said traditional infostealers used to decrypt browser credentials on the victim’s machine by loading SQLite libraries and accessing credential stores directly, before endpoint security tools adapted to flag such malicious behavior.

“Then Google introduced App-Bound Encryption in Chrome 127 (July 2024), which tied encryption keys to Chrome itself and made local decryption even harder,” he said.

“The first wave of bypasses involved injecting into Chrome or abusing its debugging protocol, but those still left traces that security tools could pick up.”

Enter Storm, which ships encrypted files to their own infrastructure instead of decrypting them locally.

Kelley also noted that Storm takes this approach further by “handling both Chromium and Gecko-based browsers (Firefox, Waterfox, Pale Moon) server-side, where StealC V2 [another infostealer] still processes Firefox locally.”

Storm Automates Stolen Logs Retrieval

In the case of Storm, data collected after infection includes everything attackers need to restore hijacked sessions remotely and steal from their victims, such as saved passwords, session cookies, autofill, Google account tokens, credit card data and browsing history.

“One compromised employee browser can hand an operator authenticated access to SaaS platforms, internal tools, and cloud environments without ever triggering a password-based alert,” Kelley wrote.

Additionally, Storm steals documents from user directories, captures system information and screenshots, pulls session data from Telegram, Signal and Discord and targets crypto wallets through both browser extensions and desktop apps. “Everything runs in memory to reduce the chance of detection,” Kelley explained.

While most stealers require buyers to manually replay stolen logs in their operator’s panel, Storm automates the next step by feeding in a Google Refresh Token and a geographically matched SOCKS5 proxy so that the panel silently restores the victim’s authenticated session. 

Stolen Social Media and Crypto Credentials Tied to Storm

Storm is available for less than $1000 per month, said Varonis.

During the investigation, the cybersecurity company found 1,715 entries originating from multiple countries, including Brazil, Ecuador, India, Indonesia the US and Vietnam.

“While it is difficult to confirm whether all entries represent real victims or include test data based solely on the panel imagery, the diverse IP addresses, ISPs, and data sizes suggest the presence of active malicious campaigns,” Kelley wrote.

The stolen credentials cover a range of high-value platforms, including:

  • Social media and communication: Google, Facebook, Twitter/X
  • Cryptocurrency and financial services: Coinbase, Binance, Blockchain.com, Crypto.com

This type of compromised data is commonly traded on credential marketplaces, where it is used for account takeovers, fraud, and as an entry point for more targeted cyber intrusions.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDevice Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
Next Article Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
Team-CWD
  • Website

Related Posts

News

New Phishing Platform Used in Credential Theft Campaigns

April 3, 2026
News

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

April 3, 2026
News

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.