Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

‘Stanley’ Malware Toolkit Enables Phishing via Website Spoofing

Posted on January 26, 2026January 26, 2026 By CWS

A brand new malware toolkit supplied on an underground cybercrime discussion board can preserve the browser’s handle bar unmodified whereas serving phishing pages, Varonis stories.

Dubbed Stanley, the malware-as-a-service (MaaS) toolkit is priced from $2,000 to $6,000, and was first noticed on January 12, in a publish claiming it could actually create extensions that bypass Google Retailer validation.

The highest-tier pricing offers menace actors with customization choices, a administration panel, and assured publication on the Chrome Net Retailer, Varonis has found.

“That assure is the industrial heart of gravity right here: it shifts distribution threat away from the customer and implies the vendor has a repeatable method to clear Google’s assessment course of,” the cybersecurity agency notes.

An online-based administration interface offers miscreants with a view of contaminated hosts, displaying data equivalent to IP addresses (used as identifiers), on-line standing, browser historical past standing, and final exercise timestamp.

It additionally permits operators to pick out particular person targets and to configure particular URL hijacking guidelines for them, which embody the supply/professional URL and the goal/phishing URL.Commercial. Scroll to proceed studying.

“Guidelines could be activated or deactivated per an infection, permitting operators to stage assaults and set off them on demand,” Varonis explains.

Extra importantly, a sufferer will see within the browser’s handle bar the professional URL they attempt to entry, whereas they in reality work together with the attacker-controlled content material.

“Past passive hijacking, operators can actively lure customers to focused pages by means of real-time notification supply. The notifications come from Chrome itself, not a web site, in order that they carry extra implicit belief,” Varonis explains.

Evaluation of Notely, a minimalist note-taking and bookmarking extension constructed utilizing Stanley, revealed that its creator packed it with professional performance, but additionally designed it to request the required permissions to take full management of the web sites the person visits.

The extension features a persistent polling mechanism that continuously checks with its command-and-control (C&C) server, implements backup area rotation, and intercepts web site visits to overlay a full-screen iframe containing the phishing web page.

“The browser’s URL bar continues to show the professional area (e.g., binance.com), whereas the sufferer sees and interacts with the attacker’s phishing web page,” Varonis explains.

Stanley’s value vary makes it accessible to a broad vary of cybercriminals, and malicious extensions that slip into the Chrome Net Retailer might stay energetic for months, quietly harvesting credentials, the cybersecurity agency notes.

Associated: Malicious Chrome Extension Crashes Browser in ClickFix Variant ‘CrashFix’

Associated: Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Associated: Chrome, Edge Extensions Caught Monitoring Customers, Creating Backdoors

Associated: GhostPoster Firefox Extensions Disguise Malware in Icons

Security Week News Tags:Enables, Malware, Phishing, Spoofing, Stanley, Toolkit, Website

Post navigation

Previous Post: Lazarus Hackers Actively Attacking European Drone Manufacturing Companies
Next Post: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

Related Posts

Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw Security Week News
United Natural Foods Projects Up to $400M Sales Hit from June Cyberattack Security Week News
Cyber Insights 2026: Social Engineering Security Week News
Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
China-Linked Hackers Hijack Web Traffic to Deliver Backdoor Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Curl to End Bug Bounty Following Low-Quality AI-Generated Vulnerability Reports
  • Upwind Raises $250 Million at $1.5 Billion Valuation
  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms
  • Curl to End Bug Bounty Following Low-Quality AI-Generated Vulnerability Reports
  • Upwind Raises $250 Million at $1.5 Billion Valuation
  • Crunchbase Confirms Data Breach After Hacking Claims
  • New Malware Toolkit Sends Users to Malicious Websites While the URL Stays the Same

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark