An open-source .NET-based info stealer malware dubbed SapphireStealer is being utilized by a number of entities to boost its capabilities and spawn their very own bespoke variants.
“Info-stealing malware like SapphireStealer can be utilized to acquire delicate info, together with company credentials, which are sometimes resold to different menace actors who leverage the entry for extra assaults, together with operations associated to espionage or ransomware/extortion,” Cisco Talos researcher Edmund Brumaghin mentioned in a report shared with The Hacker Information.
A complete ecosystem has developed over time that enables each financially motivated and nation-state actors to make use of providers from purveyors of stealer malware to hold out numerous sorts of assaults.
Seen in that gentle, such malware not solely represents an evolution of the cybercrime-as-a-service (CaaS) mannequin, in addition they supply different menace actors to monetize the stolen knowledge to distribute ransomware, conduct knowledge theft, and different malicious cyber actions.

SapphireStealer is rather a lot like different stealer malware which have more and more cropped up on the darkish net, geared up with options to assemble host info, browser knowledge, recordsdata, screenshots, and exfiltrate the info within the type of a ZIP file through Easy Mail Switch Protocol (SMTP).
However the truth that its supply code was revealed totally free in late December 2022 has enabled miscreants to experiment with the malware and make it tough to detect. This contains the addition of versatile knowledge exfiltration strategies utilizing a Discord webhook or Telegram API.
“A number of variants of this menace are already within the wild, and menace actors are enhancing on its effectivity and effectiveness over time,” Brumaghin mentioned.
The malware creator has additionally made public a .NET malware downloader, codenamed FUD-Loader, which makes it doable to retrieve further binary payloads from attacker-controlled distribution servers.
Talos mentioned it detected the malware downloader getting used within the wild to ship distant administration instruments like DCRat, njRAT, DarkComet, and Agent Tesla.

The disclosure comes a bit over every week after Zscaler shared particulars of one other stealer malware known as Agniane Stealer that is able to plundering credentials, system info, session particulars from browsers, Telegram, Discord, and file switch instruments, in addition to knowledge from over 70 cryptocurrency extensions and 10 wallets.
It is supplied on the market for $50 a month (no lifetime license) on a number of darkish net boards and a Telegram channel.
“The menace actors accountable for Agniane Stealer make the most of packers to keep up and frequently replace the malware’s performance and evasions options,” safety researcher Mallikarjun Piddannavar mentioned.