Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Arkanix Stealer Attacking Users to Steal VPN Accounts, Screenshots and Wi-Fi Credentials

Posted on December 2, 2025December 2, 2025 By CWS

The Arkanix stealer is a brand new malware household now spreading within the wild. It targets house customers and small workplaces that depend on VPN shoppers and wi-fi networks for every day work.

As soon as energetic, it focuses on stealing VPN account knowledge, Wi‑Fi profiles, browser credentials, and desktop screenshots.

This provides attackers direct entry to non-public networks and a transparent view of what the sufferer is doing.

Early assaults use easy however efficient lures. Victims are tricked via pretend software program downloads, cracked instruments, or e-mail hyperlinks that drop a small loader.

This loader then pulls the primary Arkanix payload from a distant server and runs it with out drawing consideration.

The entire chain is constructed to seem like a standard installer, which helps it mix into routine person exercise.

G Information Cyber Protection safety analysts recognized Arkanix throughout an investigation into new data‑stealing campaigns.

Their telemetry confirmed repeated theft of VPN profiles and Wi‑Fi keys from techniques in Europe and different areas, with the identical code base behind the assaults.

Additional evaluation revealed a modular design that lets operators change targets shortly, from browser knowledge to screenshots or different recordsdata.

As soon as loaded, Arkanix scans the system for VPN configuration recordsdata, password shops, and saved wi-fi profiles. It exports them right into a single archive, provides contemporary screenshots from the energetic desktop, after which sends the whole lot to a command‑and‑management (C2) server.

Internet panel login display screen (Supply – G Information)

Community captures present outbound HTTPS requests that disguise this theft inside encrypted visitors, making it tougher to identify.

An infection chain and knowledge theft

The principle binary runs easy however centered code to gather knowledge. A typical sample is a loop that walks recognized paths for VPN and Wi‑Fi knowledge, then posts them to the C2 endpoint:-

for every(path in target_paths){
grab_files(path);
}
take_screenshot();
upload_to_c2(zip_all());

A configuration panel utilized by the malware writer controls which modules run, similar to Wi‑Fi theft or screenshot seize.

Configuration choices (Supply – G Information)

This whole technical breakdown reveals that Arkanix is constructed for direct entry: steal VPN accounts, map Wi‑Fi networks, watch the display screen, after which let intruders transfer into these environments with little or no effort.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Accounts, Arkanix, Attacking, Credentials, Screenshots, Steal, Stealer, Users, VPN, WiFi

Post navigation

Previous Post: The Great Disconnect: Unmasking the ‘Two Separate Conversations’ in Security
Next Post: AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Related Posts

Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News
Anatsa Android Banking Malware from Google Play Targeting Users in the U.S. and Canada Cyber Security News
New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments Cyber Security News
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation Cyber Security News
New Phishing Attack Mimics Google AppSheet to Steal Login Credentials Cyber Security News
Inside ANY.RUN’s Biggest Discoveries of 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark