Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arkanix Stealer Malware Ceases Operations Quickly

Arkanix Stealer Malware Ceases Operations Quickly

Posted on February 24, 2026 By CWS

A new cybersecurity threat, the ‘Arkanix Stealer’ malware, briefly emerged as a malware-as-a-service (MaaS) before disappearing. According to Kaspersky, this malware was implemented in both C++ and Python and became active in October 2025. However, by December, its operations ceased, with the control panel and associated Discord channel vanishing.

Arkanix Stealer’s Capabilities

Despite its short lifespan, Arkanix Stealer offered extensive information-stealing features. It was capable of collecting detailed system and user information, browser data, application specifics, as well as data from Telegram and Discord. Additionally, it targeted VPN information and files from designated directories.

The MaaS model provided users access to a control panel to configure payloads and view statistics. A tool called ChromElevator was included in the package for browser post-exploitation, which could extract cryptocurrency wallet data using the C++ variant of the malware.

Technical Deployment and Features

The Python version of the stealer was distributed via scripts bundled with PyInstaller or Nuitka, allowing dynamic configuration through GET requests to a remote server. The malware was capable of gathering comprehensive system data, including hardware specifications and installed software details, and targeted 22 browsers to extract sensitive information such as passwords, cookies, and OAuth2 data.

Moreover, Arkanix Stealer had a self-propagation feature that utilized the Discord API to spread to the victim’s contacts by sending messages. It was also noted for collecting VPN credentials from popular clients and exfiltrating files from user directories, packaging them into ZIP archives for transmission to the command-and-control server.

Operational Shutdown and Observations

Kaspersky identified two secured servers that hosted the stealer panel for victim monitoring. The developer maintained a Discord channel for user interaction and promoted a referral program to expand its reach. However, this operation was characterized as a short-term campaign aimed at rapid financial gain, ending abruptly in December 2025 without any indication of further development.

The native variant of Arkanix Stealer used VMProtect for protection, incorporated anti-analysis techniques, and targeted various types of data, including gaming files. Kaspersky’s analysis suggests that while the campaign was brief, it was sophisticated and posed a significant threat during its active period.

The disappearance of Arkanix Stealer underscores the transient nature of some cyber threats, where malware-as-a-service models are employed for quick profits before being abandoned. The lack of continued activity suggests that this particular threat may not re-emerge, but vigilance remains essential as cyber threats continue to evolve.

Security Week News Tags:Arkanix Stealer, C++, ChromElevator, cyber threat, Cybersecurity, Discord, InfoStealer, Kaspersky, MaaS, Malware, Python, VPN

Post navigation

Previous Post: Critical VMware Aria Flaws Enable Remote Code Attacks
Next Post: Steganography in Images: A New Cybersecurity Threat

Related Posts

Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday Microsoft Patches 130 Vulnerabilities for July 2025 Patch Tuesday Security Week News
Pixnapping Attack Steals Data From Google, Samsung Android Phones Pixnapping Attack Steals Data From Google, Samsung Android Phones Security Week News
US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency US Sanctions North Korean Bankers Accused of Laundering Stolen Cryptocurrency Security Week News
Open VSX Downplays Impact From GlassWorm Campaign Open VSX Downplays Impact From GlassWorm Campaign Security Week News
Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign Security Week News
Juniper Networks Patches Critical Junos Space Vulnerabilities Juniper Networks Patches Critical Junos Space Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News