Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AuraStealer Malware Emerges with Expanding C2 Network

AuraStealer Malware Emerges with Expanding C2 Network

Posted on March 3, 2026 By CWS

AuraStealer, a new potent information-stealing malware, has been causing significant disturbances in the cybersecurity realm since mid-2025. This malicious software, developed and maintained by a group of Russian-speaking hackers, was initially introduced on underground forums following the disruption of the Lumma stealer infrastructure.

Emergence and Promotion of AuraStealer

First appearing on the XSS forum in July 2025 under the alias ‘AuraCorp,’ AuraStealer was marketed as a direct rival to LummaC2. The malware was promoted with a detailed post outlining its features and subscription model. Subsequently, it was advertised on multiple forums, expanding its presence across various platforms including Exploit and Darkmarket.

The developers claim that AuraStealer can extract data from over 110 browsers, more than 70 applications, and over 250 browser extensions, highlighting its extensive threat potential. This broad-reaching capability is a significant concern for cybersecurity experts.

Command-and-Control Infrastructure

Intrinsec analysts have identified that AuraStealer operates using an elaborate command-and-control (C2) framework. They discovered 48 C2 domains linked to its operations, with the threat actors utilizing cost-effective .SHOP and .CFD domains. To obscure their infrastructure, all traffic is routed through Cloudflare, complicating efforts to trace the true server locations.

Recent analyses indicate a shift from .SHOP to .CFD domains, suggesting an evolving operation. The malware’s management panel offers comprehensive features for subscribers, including campaign management tools and Telegram bot integration.

Distribution Methods and Security Recommendations

AuraStealer predominantly exploits social engineering tactics, such as the ClickFix technique. Noteworthy campaigns in October 2025 involved malicious TikTok videos masquerading as software activation tutorials, effectively tricking users into executing harmful commands via PowerShell.

In addition to TikTok lures, the malware is disseminated through various loaders and downloaders. Techniques include injecting AuraStealer into legitimate Windows processes and using tools like Visual Basic scripts and Donut shellcode loaders. Efficient security measures involve blocking unauthorized PowerShell execution and detecting process injection attempts.

To mitigate the risks posed by AuraStealer, organizations should block the known C2 domains and provide training to help employees recognize social engineering attacks. Implementing application allow-listing and restricting administrative access can further protect against potential infections.

For continued updates on cybersecurity threats, follow us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:AuraStealer, C2 domains, cyber threat, Cybersecurity, endpoint security, information stealer, Malware, network security, PowerShell attacks, Russian-speaking hackers, social engineering, TikTok lures

Post navigation

Previous Post: Google Secures Android with New Qualcomm Bug Fixes
Next Post: Starkiller Phishing Suite Evades MFA with Reverse Proxy

Related Posts

IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed Cyber Security News
Guide to Cloud API Security Guide to Cloud API Security Cyber Security News
NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks Cyber Security News
INE Expands Cross-Skilling Innovations INE Expands Cross-Skilling Innovations Cyber Security News
Zimbra Enhances Security with Critical Update Zimbra Enhances Security with Critical Update Cyber Security News
22.2 Tbps DDoS Attack Breaks Internet With New World Record 22.2 Tbps DDoS Attack Breaks Internet With New World Record Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • StegaBin Campaign Exploits npm with Credential Stealer
  • Archipelo and Checkmarx Forge AppSec Alliance
  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News