Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials

Posted on October 9, 2025October 9, 2025 By CWS

Shuyal Stealer has quickly ascended as probably the most versatile credential theft instruments noticed in latest months.

First detected in early August 2025, its modular structure permits it to focus on an expansive vary of net browsers, together with Chromium-based, Gecko-based, and legacy engines alike.

Preliminary indicators of compromise emerged as anomalous community site visitors from compromised hosts, the place customers reported unexplained browser crashes adopted by surges in outbound connections to unfamiliar command-and-control (C2) servers.

Level Wild researchers famous that inside days of its emergence, Shuyal Stealer had already compromised tons of of endpoints throughout a number of business sectors, together with finance, healthcare, and manufacturing.

The malware’s assault vectors are rooted in conventional social engineering strategies, primarily masquerading as software program updates or utility installers.

Delivered via phishing emails or malicious ads, the installer payload employs a self-extracting archive that unpacks and executes a professional system binary alongside an obfuscated DLL loader.

An infection chain circulation (Supply – Level Wild)

This side-loading mechanism permits Shuyal Stealer to evade widespread utility whitelist options.

Because the loader executes, it injects the core stealer module into working browser processes, granting it full entry to saved cookies, saved passwords, and form-autofill knowledge.

Level Wild analysts recognized using encrypted strings and API hashing to hide calls to key Home windows capabilities corresponding to LoadLibrary and GetProcAddress, complicating static evaluation by safety researchers.

Upon profitable injection, Shuyal Stealer begins its payload routines, harvesting credentials from browser SQLite databases and reminiscence.

It helps 19 completely different browsers, together with Chrome, Edge, Firefox, Opera, Vivaldi, Courageous, and several other lesser-known forks common in sure areas.

The stealer may also extract banking session tokens and two-factor authentication approvals saved in native cache.

As soon as collected, knowledge is compressed utilizing a customized ZIP implementation and encrypted with AES-256 in CBC mode earlier than exfiltration.

Visitors evaluation exhibits the malware batching stolen credentials into 512 KB chunks, that are despatched over HTTPS to a dynamically generated subdomain for every sufferer, complicating takedown efforts.

An infection and Loader Mechanism

Shuyal Stealer’s an infection mechanism hinges on DLL side-loading and unhooked API calls to take care of stealth.

After decompressing the archive, the loader writes a benign system executable (for instance, svchost.exe) into the Home windows listing and drops an accompanying malicious DLL in the identical location.

The executable is then launched with a crafted registry entry below HKCUSoftwareMicrosoftWindowsCurrentVersionRun, making certain persistence throughout reboots.

As soon as the professional executable masses, Home windows robotically resolves and masses the malicious DLL attributable to its naming conference match.

Inside the DLL’s DllMain, the loader invokes a staged unpacker:-

// Simplified unpack routine
void UnpackAndInject() {
BYTE* encryptedPayload = LoadResource(MAKEINTRESOURCE(101));
BYTE* payload = DecryptAES256(encryptedPayload, payloadSize, key, iv);
HANDLE hProc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, targetPid);
LPVOID remoteMem = VirtualAllocEx(hProc, NULL, payloadSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
WriteProcessMemory(hProc, remoteMem, payload, payloadSize, NULL);
CreateRemoteThread(hProc, NULL, 0, (LPTHREAD_START_ROUTINE)remoteMem, NULL, 0, NULL);
}

This unpacker decrypts the core stealer module in reminiscence and injects it into the goal browser course of.

By avoiding writing the first payload to disk and leveraging professional binaries, Shuyal Stealer bypasses many endpoint detection options.

Using API hashing additional thwarts heuristic detection, as perform names by no means seem in string tables.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacking, Browsers, Credentials, Login, SHUYAL, Steal, Stealer

Post navigation

Previous Post: Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day
Next Post: GitHub Copilot Chat Flaw Leaked Data From Private Repositories

Related Posts

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Tactics Cyber Security News
Critical Meshtastic Vulnerability Let Attackers to Decrypt Private Messages Cyber Security News
Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data
  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data
  • AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars
  • Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens
  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News