Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls

Posted on October 28, 2025October 28, 2025 By CWS

A classy information-stealing malware named Anivia Stealer has emerged on underground boards, marketed by a menace actor often known as ZeroTrace.

The malware represents a harmful evolution in credential theft operations, particularly designed to compromise Home windows techniques from legacy XP installations by way of the most recent Home windows 11 environments.

Constructed utilizing C++17, Anivia Stealer incorporates superior evasion methods and complete knowledge exfiltration capabilities that pose important dangers to particular person customers and enterprise networks alike.

The malware’s promoting marketing campaign highlights its means to bypass Person Account Management mechanisms by way of computerized elevation methods, permitting it to execute privileged operations with out triggering safety warnings that sometimes alert customers to suspicious exercise.

KrakenLabs researchers recognized the menace actor’s promotional efforts throughout cybercriminal marketplaces, the place Anivia Stealer is being provided on a subscription mannequin starting from €120 for one month to €680 for lifetime entry.

Evaluation reveals that the stealer targets an intensive vary of delicate data together with browser credentials, authentication cookies, cryptocurrency wallets, messaging tokens, Native Safety Authority credentials, and system screenshots.

The malware maintains encrypted communication channels with its command-and-control infrastructure and options computerized replace capabilities to evade detection signatures.

🚨 New infostealer marketed: Anivia StealerThe malware developer #ZeroTrace is selling “Anivia Stealer”: a C++17 Home windows infostealer with internet panel. 🛠️ Claimed options embrace:• UAC bypass and auto-elevation• No dependencies required• Works XP → Home windows 11•… pic.twitter.com/rKyVSBcLu6— KrakenLabs (@KrakenLabs_Team) October 28, 2025

Risk intelligence means that Anivia Stealer might signify a rebrand or fork of the beforehand recognized ZeroTrace Stealer, with GitHub commit historical past and developer metadata linking each tasks to the identical malicious actor who has additionally distributed Raven Stealer.

UAC Bypass and Privilege Escalation Mechanisms

The core performance enabling Anivia Stealer’s effectiveness lies in its Person Account Management bypass implementation.

The malware exploits Home windows privilege escalation vectors to attain computerized elevation with out consumer interplay, successfully neutralizing one of many working system’s main safety boundaries.

This method permits the stealer to entry protected system areas, registry hives containing cached credentials, and reminiscence areas holding authentication secrets and techniques that may usually require administrative approval.

The malware’s declare of requiring no exterior dependencies suggests it packages all crucial exploitation code inside its binary, lowering forensic artifacts and simplifying deployment throughout various goal environments whereas complicating detection efforts by safety options.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.


Cyber Security News Tags:Actors, Advertising, Anivia, Bypassing, Controls, Dark, Malware, Stealer, Threat, UAC, Web

Post navigation

Previous Post: Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
Next Post: Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing

Related Posts

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials Cyber Security News
Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack Cyber Security News
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Vulnerability in the Wild Cyber Security News
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Security Firm Polygraf Raises $9.5 Million in Seed Funding
  • Ghost Identities, Poisoned Accounts, & AI Agent Havoc
  • CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution
  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Security Firm Polygraf Raises $9.5 Million in Seed Funding
  • Ghost Identities, Poisoned Accounts, & AI Agent Havoc
  • CyberRidge Emerges From Stealth With $26 Million for Photonic Encryption Solution
  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News