Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Posted on January 26, 2026January 26, 2026 By CWS

A brand new malware toolkit supplied on an underground cybercrime discussion board can preserve the browser’s handle bar unmodified whereas serving phishing pages, Varonis stories.

Dubbed Stanley, the malware-as-a-service (MaaS) toolkit is priced from $2,000 to $6,000, and was first noticed on January 12, in a publish claiming it could actually create extensions that bypass Google Retailer validation.

The highest-tier pricing offers menace actors with customization choices, a administration panel, and assured publication on the Chrome Net Retailer, Varonis has found.

“That assure is the industrial heart of gravity right here: it shifts distribution threat away from the customer and implies the vendor has a repeatable method to clear Google’s assessment course of,” the cybersecurity agency notes.

An online-based administration interface offers miscreants with a view of contaminated hosts, displaying data equivalent to IP addresses (used as identifiers), on-line standing, browser historical past standing, and final exercise timestamp.

It additionally permits operators to pick out particular person targets and to configure particular URL hijacking guidelines for them, which embody the supply/professional URL and the goal/phishing URL.Commercial. Scroll to proceed studying.

“Guidelines could be activated or deactivated per an infection, permitting operators to stage assaults and set off them on demand,” Varonis explains.

Extra importantly, a sufferer will see within the browser’s handle bar the professional URL they attempt to entry, whereas they in reality work together with the attacker-controlled content material.

“Past passive hijacking, operators can actively lure customers to focused pages by means of real-time notification supply. The notifications come from Chrome itself, not a web site, in order that they carry extra implicit belief,” Varonis explains.

Evaluation of Notely, a minimalist note-taking and bookmarking extension constructed utilizing Stanley, revealed that its creator packed it with professional performance, but additionally designed it to request the required permissions to take full management of the web sites the person visits.

The extension features a persistent polling mechanism that continuously checks with its command-and-control (C&C) server, implements backup area rotation, and intercepts web site visits to overlay a full-screen iframe containing the phishing web page.

“The browser’s URL bar continues to show the professional area (e.g., binance.com), whereas the sufferer sees and interacts with the attacker’s phishing web page,” Varonis explains.

Stanley’s value vary makes it accessible to a broad vary of cybercriminals, and malicious extensions that slip into the Chrome Net Retailer might stay energetic for months, quietly harvesting credentials, the cybersecurity agency notes.

Associated: Malicious Chrome Extension Crashes Browser in ClickFix Variant ‘CrashFix’

Associated: Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Associated: GhostPoster Firefox Extensions Disguise Malware in Icons

Security Week News Tags:Enables, Malware, Phishing, Spoofing, Stanley, Toolkit, Website

Post navigation

Previous Post: Lazarus Hackers Actively Attacking European Drone Manufacturing Companies
Next Post: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

Related Posts

Follow Pragmatic Interventions to Keep Agentic AI in Check Security Week News
Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Security Week News
re:Invent 2025: AWS and Security Vendors Unveil New Products and Capabilities  Security Week News
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm Security Week News
Personal Information Compromised in Freedom Mobile Data Breach Security Week News
In Other News: Microsoft Probes ToolShell Leak, Port Cybersecurity, Raspberry Pi ATM Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
  • Nova Ransomware Allegedly Claiming Breach of KPMG Netherlands
  • 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
  • Nova Ransomware Allegedly Claiming Breach of KPMG Netherlands
  • 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark