Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

April 3, 2026

Researchers Observe Sub-One-Hour Ransomware Attacks

April 3, 2026
Facebook X (Twitter) Instagram
Friday, April 3
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Venom Stealer MaaS Platform Automates Continuous Data Theft
News

New Venom Stealer MaaS Platform Automates Continuous Data Theft

Team-CWDBy Team-CWDApril 1, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware-as-a-service (MaaS) platform dubbed Venom Stealer that automates credential theft and continuous data exfiltration has been identified by cybersecurity researchers.

The platform is being sold on cybercrime networks and is designed to go beyond traditional credential harvesting tools by maintaining ongoing access to stolen data even after the initial infection.

Integrating ClickFix Into Venom Stealer

According to a new advisory published by BlackFog researchers on March 31, Venom Stealer includes the integration of ClickFix social engineering directly into its operator panel, allowing attackers to automate the entire attack chain from infection to data theft.

The platform operates on a subscription model ranging from $250 per month to $1,800 for lifetime access, and includes Telegram-based licensing and an affiliate program.

The infection process begins when a victim lands on a fake webpage, such as a Cloudflare CAPTCHA, an OS update prompt, an SSL certificate error or a font installation page. Victims are instructed to open a Run dialog or Terminal, paste a command and execute it themselves, which makes the activity appear user-initiated and helps bypass detection systems.

Once executed, the malware extracts saved passwords, session cookies, browsing history, autofill data and cryptocurrency wallet information from Chromium and Firefox-based browsers. The malware also performs system fingerprinting and collects browser extension data, creating a detailed profile of the infected system.

Read more on social engineering attacks: Anatomy of a Service Desk Social Engineering Attack

Continuous Exfiltration and Crypto Theft

Unlike traditional infostealers that run once and exit, Venom Stealer remains active and continuously monitors Chrome’s login database to capture newly saved credentials in real time. This makes credential rotation less effective as a response strategy and extends the period during which data can be stolen.

If cryptocurrency wallets are found, the data is sent to a server-side cracking engine running on GPU infrastructure. Once cracked, funds are automatically transferred across multiple blockchain networks, including tokens and decentralized finance positions.

Key capabilities of the malware include:

  • Automated ClickFix delivery templates for Windows and macOS

  • Continuous credential monitoring after infection

  • Cryptocurrency wallet cracking and automatic fund transfers

  • File system search for seed phrases and password files

BlackFog said the attack chain can be disrupted by restricting PowerShell execution, disabling the Run dialog for standard users and training employees to recognize ClickFix-style social engineering attempts. Monitoring outbound network traffic is also important, as the malware relies on immediate data exfiltration to attacker-controlled servers.

The research indicated that the platform is actively maintained, with multiple updates released in March 2026, suggesting a full-time development operation.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGhost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials
Next Article The Hidden Cost of Cybersecurity Specialization: Losing Foundational Skills
Team-CWD
  • Website

Related Posts

News

GitHub Used as Covert Channel in Multi-Stage Malware Campaign

April 3, 2026
News

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

April 3, 2026
News

Researchers Observe Sub-One-Hour Ransomware Attacks

April 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Top IRS scams to look out for in 2026

February 10, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.