Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers

Posted on November 21, 2025November 21, 2025 By CWS

Xillen Stealer, a classy Python-based data stealer, has emerged as a big menace within the cybercriminal panorama.

Initially recognized by Cyfirma in September 2025, this cross-platform malware has not too long ago advanced into variations 4 and 5, introducing a harmful arsenal of options designed to steal delicate credentials, cryptocurrency wallets, and system data whereas evading fashionable safety programs.

The malware targets knowledge throughout greater than 100 browsers and over 70 cryptocurrency wallets, positioning itself as a complete credential harvesting device marketed by way of Telegram channels.

The malware operates by way of a professional-looking interface that permits attackers to handle exfiltrated knowledge, monitor infections, and examine configuration settings.

Xillen Stealer’s performance extends far past primary data theft.

It captures browser knowledge together with historical past, cookies, and saved passwords, whereas concurrently focusing on password managers like OnePass, LastPass, BitWarden, and Dashlane.

The stealer additionally focuses on gathering developer credentials, cloud configurations from AWS, GCP, and Azure, alongside SSH keys and database connection data.

Darktrace safety analysts famous that the newest variations introduce an progressive method to focusing on high-value victims.

The malware consists of an AITargetDetection class designed to establish worthwhile targets primarily based on weighted indicators and particular key phrases.

It searches for cryptocurrency wallets, banking credentials, premium accounts, and developer entry, whereas prioritizing victims in rich international locations together with the US, United Kingdom, Germany, and Japan.

Though the implementation at the moment depends on rule-based sample matching fairly than precise machine studying, it demonstrates how menace actors plan to combine AI into future campaigns.

Xillen Stealer

Essentially the most regarding side of Xillen Stealer lies in its superior evasion capabilities. The AIEvasionEngine module employs a number of strategies to bypass safety programs.

Xillen Stealer (Supply -Darktrace)

These embody behavioral mimicking that simulates reliable consumer actions, noise injection to confuse behavioral classifiers, timing randomization with irregular delays, and useful resource camouflage designed to mimic regular purposes.

The malware additional employs API name obfuscation and reminiscence entry sample alterations to defeat machine learning-based detection programs.

Moreover, the Polymorphic Engine transforms code by way of instruction substitution, management stream obfuscation, and lifeless code injection to make sure every pattern seems distinctive, stopping signature-based detection.

For knowledge exfiltration, Xillen Stealer implements a peer-to-peer command-and-control construction leveraging blockchain transactions, anonymizing networks like Tor and I2P, and distributed file programs.

The malware creates HTML and TXT reviews containing stolen knowledge and sends them to attackers’ Telegram accounts.

Safety professionals should stay vigilant in opposition to this evolving menace, as its mixture of credential theft, detection evasion, and adaptive focusing on capabilities represents a big danger to each particular person customers and enterprise environments.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Advanced, Data, Detection, Evade, Features, Managers, Password, Sensitive, Steal, Stealer, Xillen

Post navigation

Previous Post: Dark Web Job Market Evolved
Next Post: AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload

Related Posts

CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
Top 10 Best Digital Footprint Monitoring Tools For Organizations 2025 Cyber Security News
CISA Warns of Dassault Systèmes Vulnerabilities Actively Exploited in Attacks Cyber Security News
Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
  • APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark