Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
From Browser Stealer to Intelligence-Gathering Tool

From Browser Stealer to Intelligence-Gathering Tool

Posted on June 28, 2025June 28, 2025 By CWS

Jun 28, 2025Ravie LakshmananMalware / Cyber Warfare
The risk actor behind the GIFTEDCROOK malware has made vital updates to show the computer virus from a fundamental browser information stealer to a potent intelligence-gathering software.
“Latest campaigns in June 2025 show GIFTEDCROOK’s enhanced means to exfiltrate a broad vary of delicate paperwork from the gadgets of focused people, together with doubtlessly proprietary recordsdata and browser secrets and techniques,” Arctic Wolf Labs mentioned in a report revealed this week.
“This shift in performance, mixed with the content material of its phishing lures, […] suggests a strategic give attention to intelligence gathering from Ukrainian governmental and navy entities.”

GIFTEDCROOK was first documented by the Laptop Emergency Response Group of Ukraine (CERT-UA) in early April 2025 in reference to a marketing campaign concentrating on navy entities, legislation enforcement businesses, and native self-government our bodies.

The exercise, attributed to a hacking group it tracks as UAC-0226, entails the usage of phishing emails containing macro-laced Microsoft Excel paperwork that act as a conduit to deploy GIFTEDCROOK.
An data stealer at its core, the malware is designed to steal cookies, shopping historical past, and authentication information from standard net browsers similar to Google Chrome, Microsoft Edge, and Mozilla Firefox.
Arctic Wolf’s evaluation of the artifacts has revealed that the stealer began off as a demo in February 2025, earlier than gaining new options with variations 1.2 and 1.3.

These new iterations embrace the power to reap paperwork and recordsdata under 7 MB in measurement, particularly searching for recordsdata created or modified throughout the final 45 days. The malware particularly searches for the next extensions: .doc, .docx, .rtf, .pptx, .ppt, .csv, .xls, .xlsx, .jpeg, .jpg, .png, .pdf, .odt, .ods, .rar, .zip, .eml, .txt, .sqlite, and .ovpn.
The e-mail campaigns leverage military-themed PDF lures to entice customers into clicking on a Mega cloud storage hyperlink that hosts a macro-enabled Excel workbook (“Список оповіщених військовозобов’язаних організації 609528.xlsm”), inflicting GIFTEDCROOK to be downloaded when the recipient activates macros. Many customers do not understand how widespread macro-enabled Excel recordsdata are in phishing assaults. They slip previous defenses as a result of folks usually count on spreadsheets in work emails—particularly ones that look official or government-related.

The captured data is bundled right into a ZIP archive and exfiltrated to an attacker-controlled Telegram channel. If the entire archive measurement exceeds 20 MB, it’s damaged down into a number of components. By sending stolen ZIP archives in small chunks, GIFTEDCROOK avoids detection and skips round conventional community filters. Within the ultimate stage, a batch script is executed to erase traces of the stealer from the compromised host.

This is not nearly stealing passwords or monitoring on-line conduct—it is focused cyber espionage. The malware’s new means to sift by latest recordsdata and seize paperwork like PDFs, spreadsheets, and even VPN configs factors to an even bigger objective: gathering intelligence. For anybody working in public sector roles or dealing with delicate inner stories, this sort of doc stealer poses an actual threat—not simply to the person, however to your complete community they’re related to.
“The timing of the campaigns mentioned on this report demonstrates clear alignment with geopolitical occasions, notably the latest negotiations between Ukraine and Russia in Istanbul,” Arctic Wolf mentioned.
“The development from easy credential theft in GIFTEDCROOK model 1, to complete doc and information exfiltration in variations 1.2 and 1.3, displays coordinated growth efforts the place malware capabilities adopted geopolitical targets to boost information assortment from compromised methods in Ukraine.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Browser, IntelligenceGathering, Stealer, Tool

Post navigation

Previous Post: Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
Next Post: FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

Related Posts

DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The Hacker News
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability The Hacker News
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups The Hacker News
Bridging the Remediation Gap: Introducing Pentera Resolve Bridging the Remediation Gap: Introducing Pentera Resolve The Hacker News
Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions Trend Micro Apex Central RCE Flaw Scores 9.8 CVSS in On-Prem Windows Versions The Hacker News
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark