Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Windows-Based DarkCloud Stealer Attacking Computers to Steal Login Credentials and Financial Data

Posted on August 8, 2025August 8, 2025 By CWS

A complicated new variant of the DarkCloud data stealer has emerged within the cyberthreat panorama, focusing on Home windows customers by fastidiously crafted phishing campaigns designed to reap delicate credentials and monetary data.

This fileless malware variant represents a major evolution in stealer expertise, using superior evasion strategies and multi-stage deployment mechanisms that make detection notably difficult for conventional safety options.

The marketing campaign begins with misleading phishing emails containing RAR archives disguised as pressing enterprise quotes.

When victims extract and execute the JavaScript file named “Quote #S_260627.js,” the malware initiates a posh an infection chain that finally deploys the DarkCloud payload with out leaving conventional file signatures on the compromised system.

New DarkCloud variant an infection chain (Supply – Fortinet)

The assault vector leverages social engineering ways, presenting seemingly professional enterprise communications that immediate customers to open malicious attachments.

Fortinet analysts recognized this new DarkCloud variant in early July 2025, noting its subtle use of course of hollowing strategies and fileless deployment methods.

The researchers noticed that this marketing campaign particularly targets saved login credentials, cost card data, and speak to lists saved throughout a number of in style purposes together with internet browsers, electronic mail purchasers, and FTP software program.

The malware demonstrates explicit sophistication in its knowledge harvesting capabilities, focusing on main internet browsers reminiscent of Google Chrome, Microsoft Edge, Mozilla Firefox, and Courageous Browser.

It executes particular SQL queries towards browser databases to extract delicate data: SELECT origin_url, username_value, password_value FROM logins for credential harvesting and SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards for monetary knowledge extraction.

Superior Persistence and Evasion Mechanisms

The DarkCloud variant employs a number of subtle strategies to keep up persistence and evade detection on contaminated techniques.

Upon profitable execution, the malware establishes persistence by copying the preliminary JavaScript file to C:UsersPublicDownloadsedriophthalma.js and creating an auto-run registry entry below HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun.

View of the disguised JPEG file (Supply – Fortinet)

This ensures the malware mechanically executes throughout system startup, sustaining its presence throughout reboots.

Essentially the most notable technical development on this variant lies in its fileless deployment technique.

The malware downloads a seemingly innocuous JPEG picture from archive.org/obtain/universe-1733359315202-8750/universe-1733359315202-8750.jpg that really comprises an encrypted .NET DLL embedded inside its pixel knowledge.

The PowerShell part extracts this hidden payload by parsing the picture file and loading the meeting instantly into reminiscence utilizing [Reflection.Assembly]::Load() strategies.

To evade automated evaluation techniques, DarkCloud implements anti-sandbox strategies that monitor consumer interplay by the GetAsyncKeyState() API.

The malware stays dormant till it detects precise keyboard or mouse exercise, successfully bypassing sandboxed environments that lack real consumer interplay.

This behavioral evaluation evasion represents a major problem for automated safety testing platforms.

Equip your SOC with full entry to the newest risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacking, Computers, Credentials, DarkCloud, Data, Financial, Login, Steal, Stealer, WindowsBased

Post navigation

Previous Post: Axis Camera Server Vulnerabilities Exposes Thousands of Organizations to Attack
Next Post: How to Secure Online Surveys and Forms

Related Posts

12 Best Infrastructure Monitoring Tools in 2025 Cyber Security News
Web DDoS, App Exploitation Attacks Saw a Huge Surge in First Half of 2025 Cyber Security News
ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control Cyber Security News
Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details Cyber Security News
AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses Cyber Security News
UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News