• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

Styx Stealer: New malware stealing browser and crypto data

user avatar

by Giorgi Kostiuk

a year ago


  1. Discovery and Features of Styx Stealer
  2. Developer's Mistake and Data Leak
  3. CPR Investigation and Consequences

  4. Check Point Research (CPR) uncovered a new malware called Styx Stealer, capable of stealing browser data, cryptocurrency, and instant messenger sessions. This malware is a variant of Phemedrone Stealer, featuring new functionalities.

    Discovery and Features of Styx Stealer

    According to CPR, Styx Stealer is an updated version of Phemedrone Stealer. The new variant includes features like auto-start and crypto-clipping.

    Developer's Mistake and Data Leak

    During debugging, a developer linked to the Agent Tesla threat actor known as 'Fucosreal' made a critical mistake, leaking sensitive data. This allowed CPR researchers to gather intelligence on clients, profits, and personal details.

    CPR Investigation and Consequences

    The investigation revealed that Styx Stealer is based on an older version of Phemedrone Stealer, lacking some advanced features. The developer's failure in operational security compromised the campaign, allowing CPR to identify the involved individuals, their locations, and personal details.

    Despite attempts to distribute the malware, the campaign largely failed.Check Point Research Team

    The discovery of Styx Stealer underscores the importance of operational security in malware development and illustrates how a single mistake can lead to significant consequences for cybercriminals.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

CZ highlights the significance of AI in the progress of cryptocurrency.

chest

CZ highlights the transformative effects of AI on crypto development, noting that it accelerates coding and product timelines significantly.

user avatarTando Nkube

Bee Network Encounters Issues with Transparency and Governance.

chest

Bee Network is facing transparency and governance concerns due to its anonymous core team and lack of detailed information about its leadership, leading to user skepticism regarding data collection practices.

user avatarAyman Ben Youssef

HBAR's Technological Edge and Institutional Partnerships Drive Adoption

chest

HBAR's unique technology and institutional partnerships position it for growth in enterprise applications.

user avatarKofi Adjeman

BNB Chain Shows Impressive Weekly Performance Metrics.

chest

BNB Chain has released its weekly data snapshot covering January 1 to January 7, 2026, showcasing impressive metrics.

user avatarNguyen Van Long

Understanding KSocial: A Summary of Its Technical Structure.

chest

KSocial operates on a unique architecture that includes Kaspa nodes, indexers, and frontends, allowing users to engage with the platform effectively.

user avatarAyman Ben Youssef

SolStaking Adopts a Security-First Approach with Insured Custodianship.

chest

SolStaking introduces a security-first operational structure with insured custody and asset segregation to enhance accountability and transparency.

user avatarSatoshi Nakamura

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.