Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials

New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials

Posted on December 2, 2025December 2, 2025 By CWS

The Arkanix stealer is a brand new malware household now spreading within the wild. It targets house customers and small workplaces that depend on VPN shoppers and wi-fi networks for every day work.

As soon as energetic, it focuses on stealing VPN account knowledge, Wi‑Fi profiles, browser credentials, and desktop screenshots.

This provides attackers direct entry to non-public networks and a transparent view of what the sufferer is doing.

Early assaults use easy however efficient lures. Victims are tricked via pretend software program downloads, cracked instruments, or e-mail hyperlinks that drop a small loader.

This loader then pulls the primary Arkanix payload from a distant server and runs it with out drawing consideration.

The entire chain is constructed to seem like a standard installer, which helps it mix into routine person exercise.

G Information Cyber Protection safety analysts recognized Arkanix throughout an investigation into new data‑stealing campaigns.

Their telemetry confirmed repeated theft of VPN profiles and Wi‑Fi keys from techniques in Europe and different areas, with the identical code base behind the assaults.

Additional evaluation revealed a modular design that lets operators change targets shortly, from browser knowledge to screenshots or different recordsdata.

As soon as loaded, Arkanix scans the system for VPN configuration recordsdata, password shops, and saved wi-fi profiles. It exports them right into a single archive, provides contemporary screenshots from the energetic desktop, after which sends the whole lot to a command‑and‑management (C2) server.

Internet panel login display screen (Supply – G Information)

Community captures present outbound HTTPS requests that disguise this theft inside encrypted visitors, making it tougher to identify.

An infection chain and knowledge theft

The principle binary runs easy however centered code to gather knowledge. A typical sample is a loop that walks recognized paths for VPN and Wi‑Fi knowledge, then posts them to the C2 endpoint:-

for every(path in target_paths){
grab_files(path);
}
take_screenshot();
upload_to_c2(zip_all());

A configuration panel utilized by the malware writer controls which modules run, similar to Wi‑Fi theft or screenshot seize.

Configuration choices (Supply – G Information)

This whole technical breakdown reveals that Arkanix is constructed for direct entry: steal VPN accounts, map Wi‑Fi networks, watch the display screen, after which let intruders transfer into these environments with little or no effort.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Accounts, Arkanix, Attacking, Credentials, Screenshots, Steal, Stealer, Users, VPN, WiFi

Post navigation

Previous Post: The Great Disconnect: Unmasking the ‘Two Separate Conversations’ in Security
Next Post: AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Related Posts

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code Cyber Security News
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems Cyber Security News
Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node Kimwolf Botnet Hacked 2 Million Devices and Turned User’s Internet Connection as Proxy Node Cyber Security News
China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware Cyber Security News
Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach Cyber Security News
Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Critical Ivanti Update Fixes Endpoint Manager Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News