Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers

Posted on November 21, 2025November 21, 2025 By CWS

Xillen Stealer, a classy Python-based data stealer, has emerged as a big menace within the cybercriminal panorama.

Initially recognized by Cyfirma in September 2025, this cross-platform malware has not too long ago advanced into variations 4 and 5, introducing a harmful arsenal of options designed to steal delicate credentials, cryptocurrency wallets, and system data whereas evading fashionable safety programs.

The malware targets knowledge throughout greater than 100 browsers and over 70 cryptocurrency wallets, positioning itself as a complete credential harvesting device marketed by way of Telegram channels.

The malware operates by way of a professional-looking interface that permits attackers to handle exfiltrated knowledge, monitor infections, and examine configuration settings.

Xillen Stealer’s performance extends far past primary data theft.

It captures browser knowledge together with historical past, cookies, and saved passwords, whereas concurrently focusing on password managers like OnePass, LastPass, BitWarden, and Dashlane.

The stealer additionally focuses on gathering developer credentials, cloud configurations from AWS, GCP, and Azure, alongside SSH keys and database connection data.

Darktrace safety analysts famous that the newest variations introduce an progressive method to focusing on high-value victims.

The malware consists of an AITargetDetection class designed to establish worthwhile targets primarily based on weighted indicators and particular key phrases.

It searches for cryptocurrency wallets, banking credentials, premium accounts, and developer entry, whereas prioritizing victims in rich international locations together with the US, United Kingdom, Germany, and Japan.

Though the implementation at the moment depends on rule-based sample matching fairly than precise machine studying, it demonstrates how menace actors plan to combine AI into future campaigns.

Xillen Stealer

Essentially the most regarding side of Xillen Stealer lies in its superior evasion capabilities. The AIEvasionEngine module employs a number of strategies to bypass safety programs.

Xillen Stealer (Supply -Darktrace)

These embody behavioral mimicking that simulates reliable consumer actions, noise injection to confuse behavioral classifiers, timing randomization with irregular delays, and useful resource camouflage designed to mimic regular purposes.

The malware additional employs API name obfuscation and reminiscence entry sample alterations to defeat machine learning-based detection programs.

Moreover, the Polymorphic Engine transforms code by way of instruction substitution, management stream obfuscation, and lifeless code injection to make sure every pattern seems distinctive, stopping signature-based detection.

For knowledge exfiltration, Xillen Stealer implements a peer-to-peer command-and-control construction leveraging blockchain transactions, anonymizing networks like Tor and I2P, and distributed file programs.

The malware creates HTML and TXT reviews containing stolen knowledge and sends them to attackers’ Telegram accounts.

Safety professionals should stay vigilant in opposition to this evolving menace, as its mixture of credential theft, detection evasion, and adaptive focusing on capabilities represents a big danger to each particular person customers and enterprise environments.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Advanced, Data, Detection, Evade, Features, Managers, Password, Sensitive, Steal, Stealer, Xillen

Post navigation

Previous Post: Dark Web Job Market Evolved
Next Post: AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload

Related Posts

New Malware Attack Weaponizing LNK Files to Install The REMCOS Backdoor on Windows Machines Cyber Security News
Hackers Flooded npm Registry Over 43,000 Spam Packages Survived for Almost Two Years Cyber Security News
Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Massive “Shai-Halud” Supply Chain Attack Compromised 477 NPM Packages Cyber Security News
New Phishing Attack Impersonates as DWP Attacking Users to Steal Credit Card Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark