Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics

Enhanced ACRStealer Variant Utilizes Advanced Evasion Tactics

Posted on March 16, 2026 By CWS

A sophisticated new version of ACRStealer has been identified, showcasing enhanced evasion techniques that elevate its threat level significantly. Initially uncovered by Proofpoint in early 2025 as an evolved form of Amatera Stealer, this variant boasts syscall evasion, encrypted command-and-control (C2) communication, and the potential to deliver secondary payloads. These improvements signal a concerted effort to advance the malware’s capabilities.

Malware-as-a-Service Model

ACRStealer operates as a Malware-as-a-Service (MaaS), allowing various threat actors to lease it for malicious campaigns. In its latest deployment, it is delivered as a final payload through HijackLoader, associated with the PiviGames distribution platform. The attack initiates when users on platforms like Steam, Discord, or Reddit are enticed to click on a malicious link, leading them to a redirection chain that ultimately downloads a malware-laden ZIP file disguised as legitimate software.

Technical Advancements in Evasion

This ACRStealer variant, discovered by G Data analysts during a HijackLoader investigation, showcases several technical enhancements. Unlike its predecessors that used a Dead Drop Resolver for C2 server addresses, this version employs native Windows kernel interfaces and encrypted channels, complicating detection efforts. Active infections have been noted in the United States, Mongolia, and Germany, with all instances reporting to a specific C2 server.

The variant’s data exfiltration is extensive, targeting browser credentials, session cookies, and gaming account information. It saves stolen data to a specific file before transmission to the C2 server. Additionally, it performs comprehensive system profiling, gathering data such as machine GUID and system architecture, which it compresses into an in-memory archive for transmission.

Network Communication and Detection Avoidance

Notably, this variant circumvents standard API monitoring by resolving necessary functions manually and executing system calls at the kernel level, bypassing user-mode hooks. On the network side, it constructs a raw TCP IPv4 socket, avoiding the Winsock library, and uses Microsoft’s SSPI framework for TLS handshakes, camouflaging its traffic as normal HTTPS activity.

Security measures should include monitoring low-level API usage and blocking identified C2 indicators. Users are advised against downloading files from unverified sources, particularly on gaming platforms. The evolving nature of this threat underscores the importance of robust security practices and awareness.

Stay updated by following us on Google News, LinkedIn, and X. Set CSN as a preferred source on Google for more immediate updates.

Cyber Security News Tags:ACRStealer, cyber threats, Cybersecurity, data exfiltration, HijackLoader, Malware, malware-as-a-service, network security, syscall evasion, TLS communication

Post navigation

Previous Post: Oracle EBS Cyberattack: Silence from Four Major Firms
Next Post: AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Related Posts

OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes OpenClaw 2026.2.12 Update Enhances Security with 40+ Fixes Cyber Security News
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News
Critical OpenSSH GSSAPI Flaw Threatens Linux Servers Critical OpenSSH GSSAPI Flaw Threatens Linux Servers Cyber Security News
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware Cyber Security News
Cybercriminals Exploit Cloud Services for Phishing Cybercriminals Exploit Cloud Services for Phishing Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Flaw in WordPress Plugin Uncovered After Years
  • Supply Chain Attack Compromises Popular Python Package
  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Flaw in WordPress Plugin Uncovered After Years
  • Supply Chain Attack Compromises Popular Python Package
  • AI Propels Cybercrime with Rapid Attack Deployment
  • Zero Trust Guidelines for Protecting Industrial Systems
  • Anthropic Launches Claude Security to Combat AI Exploit Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark