Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics

Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics

Posted on March 16, 2026 By CWS

A sophisticated new version of ACRStealer has been identified, showcasing enhanced evasion techniques that elevate its threat level significantly. Initially uncovered by Proofpoint in early 2025 as an evolved form of Amatera Stealer, this variant boasts syscall evasion, encrypted command-and-control (C2) communication, and the potential to deliver secondary payloads. These improvements signal a concerted effort to advance the malware’s capabilities.

Malware-as-a-Service Model

ACRStealer operates as a Malware-as-a-Service (MaaS), allowing various threat actors to lease it for malicious campaigns. In its latest deployment, it is delivered as a final payload through HijackLoader, associated with the PiviGames distribution platform. The attack initiates when users on platforms like Steam, Discord, or Reddit are enticed to click on a malicious link, leading them to a redirection chain that ultimately downloads a malware-laden ZIP file disguised as legitimate software.

Technical Advancements in Evasion

This ACRStealer variant, discovered by G Data analysts during a HijackLoader investigation, showcases several technical enhancements. Unlike its predecessors that used a Dead Drop Resolver for C2 server addresses, this version employs native Windows kernel interfaces and encrypted channels, complicating detection efforts. Active infections have been noted in the United States, Mongolia, and Germany, with all instances reporting to a specific C2 server.

The variant’s data exfiltration is extensive, targeting browser credentials, session cookies, and gaming account information. It saves stolen data to a specific file before transmission to the C2 server. Additionally, it performs comprehensive system profiling, gathering data such as machine GUID and system architecture, which it compresses into an in-memory archive for transmission.

Network Communication and Detection Avoidance

Notably, this variant circumvents standard API monitoring by resolving necessary functions manually and executing system calls at the kernel level, bypassing user-mode hooks. On the network side, it constructs a raw TCP IPv4 socket, avoiding the Winsock library, and uses Microsoft’s SSPI framework for TLS handshakes, camouflaging its traffic as normal HTTPS activity.

Security measures should include monitoring low-level API usage and blocking identified C2 indicators. Users are advised against downloading files from unverified sources, particularly on gaming platforms. The evolving nature of this threat underscores the importance of robust security practices and awareness.

Stay updated by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for more immediate updates.

Cyber Security News Tags:ACRStealer, cyber threats, Cybersecurity, data exfiltration, HijackLoader, Malware, malware-as-a-service, network security, syscall evasion, TLS communication

Post navigation

Previous Post: Oracle EBS Cyberattack: Silence from Four Major Firms
Next Post: AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Related Posts

First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks Cyber Security News
Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset Cyber Security News
Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware Cyber Security News
Cloudflare Acquires Human Native to Strengthen AI Data Security Cloudflare Acquires Human Native to Strengthen AI Data Security Cyber Security News
Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Inside the Leaks that Exposed the Hidden Infrastructure Behind a Ransomware Operation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware
  • Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics
  • Oracle EBS Cyberattack: Silence from Four Major Firms
  • OpenClaw AI Vulnerabilities Enable Silent Data Breaches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware
  • Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics
  • Oracle EBS Cyberattack: Silence from Four Major Firms
  • OpenClaw AI Vulnerabilities Enable Silent Data Breaches

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News