Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month

Posted on July 4, 2025July 4, 2025 By CWS

A brand new credential-stealing malware dubbed “123 | Stealer” has surfaced on underground cybercrime boards, being marketed by risk actor “koneko” for $120 per 30 days. 

This malware-as-a-service (MaaS) providing represents the most recent evolution in data stealer know-how, combining refined information exfiltration capabilities with a user-friendly administrative interface.

Key Takeaways1. “123 | Stealer” marketed for $120/month by risk actor “koneko” on underground boards.2. C++ coded, DLL-free (~700KB), helps 70+ browser extensions, requires self-hosted proxy servers.3. Steals browser information, passwords, crypto wallets, Discord accounts, and performs file/course of grabbing.4. Skilled presentation however lacks cybercriminal evaluations, making effectiveness unsure

The stealer targets a complete vary of delicate information, demonstrating the rising commercialization of cybercrime instruments. 

In keeping with the discussion board commercial, the malware harvests browser information, cookies, saved passwords, cryptocurrency pockets data, and browser extensions. 

The risk actor claims the stealer also can carry out course of grabbing and file grabbing operations, making it a flexible instrument for information theft operations.

Risk actor Koneko Gives $120/Month Credential Stealer

123 | Stealer Bypasses AV, Targets Browsers and Crypto Wallets

In keeping with the Kraken Labs report, 123 | Stealer is written in C++, a programming language selection that implies builders prioritized efficiency and low-level system entry. 

The malware encompasses a DLL-free stub structure, weighing roughly 700KB, which makes it harder to detect by conventional antivirus options that depend on dynamic hyperlink library (DLL) injection detection strategies.

One notable side is the proxy server requirement. Customers should set up their very own proxy infrastructure utilizing Ubuntu or Debian-based servers, indicating a classy command and management (C2) structure. 

Concentrating on browsers

This method permits malware operators to take care of operational safety (OPSEC) whereas distributing infrastructure burden to prospects.

The executive panel reveals in depth browser assist, together with compatibility with over 70 browser extensions. 

The stealer targets main Chromium-based browsers reminiscent of Google Chrome, Opera, and Chromium itself, in addition to Gecko-based browsers like Firefox variants. 

Standard purposes, together with Discord, Battle.web, and varied cryptocurrency wallets, are additionally throughout the malware’s scope.

Mid-Tier Risk, Prices $120 Month-to-month

The $120 month-to-month subscription mannequin positions 123 | Stealer within the mid-tier market phase of knowledge stealers. 

This pricing technique targets each novice cybercriminals and skilled risk actors in search of dependable information exfiltration instruments. The subscription mannequin ensures recurring income for malware authors whereas offering steady updates and assist to prospects.

The discussion board commercial emphasizes that customers are accountable for any detection or drive majeure occasions, indicating that malware authors are trying to restrict their legal responsibility. 

Moreover, the service explicitly prohibits operations in Russia, CIS nations, and former Soviet republics, a standard restriction amongst cybercrime providers.

At present, the malware has not obtained public evaluations from different cybercriminals on the discussion board, making its precise effectiveness unverified. 

Nevertheless, the skilled presentation of the login interface and complete administrative panel suggests vital improvement funding, indicating this can be a severe risk reasonably than a rip-off operation.

Safety researchers and organizations ought to monitor for 123 | Stealer samples and replace detection signatures to guard towards this rising risk.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Advertised, Forums, Hacking, Month, Stealer, Underground

Post navigation

Previous Post: Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
Next Post: Microsoft Investigating Forms Service Issue Not Accessible for Users

Related Posts

Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News
Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Abusing dMSA with Advanced Active Directory Persistence Techniques  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Block Malvertising
  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News