Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New “123 | Stealer” Advertised on Underground Hacking Forums for 0 Per Month

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month

Posted on July 4, 2025July 4, 2025 By CWS

A brand new credential-stealing malware dubbed “123 | Stealer” has surfaced on underground cybercrime boards, being marketed by risk actor “koneko” for $120 per 30 days. 

This malware-as-a-service (MaaS) providing represents the most recent evolution in data stealer know-how, combining refined information exfiltration capabilities with a user-friendly administrative interface.

Key Takeaways1. “123 | Stealer” marketed for $120/month by risk actor “koneko” on underground boards.2. C++ coded, DLL-free (~700KB), helps 70+ browser extensions, requires self-hosted proxy servers.3. Steals browser information, passwords, crypto wallets, Discord accounts, and performs file/course of grabbing.4. Skilled presentation however lacks cybercriminal evaluations, making effectiveness unsure

The stealer targets a complete vary of delicate information, demonstrating the rising commercialization of cybercrime instruments. 

In keeping with the discussion board commercial, the malware harvests browser information, cookies, saved passwords, cryptocurrency pockets data, and browser extensions. 

The risk actor claims the stealer also can carry out course of grabbing and file grabbing operations, making it a flexible instrument for information theft operations.

Risk actor Koneko Gives $120/Month Credential Stealer

123 | Stealer Bypasses AV, Targets Browsers and Crypto Wallets

In keeping with the Kraken Labs report, 123 | Stealer is written in C++, a programming language selection that implies builders prioritized efficiency and low-level system entry. 

The malware encompasses a DLL-free stub structure, weighing roughly 700KB, which makes it harder to detect by conventional antivirus options that depend on dynamic hyperlink library (DLL) injection detection strategies.

One notable side is the proxy server requirement. Customers should set up their very own proxy infrastructure utilizing Ubuntu or Debian-based servers, indicating a classy command and management (C2) structure. 

Concentrating on browsers

This method permits malware operators to take care of operational safety (OPSEC) whereas distributing infrastructure burden to prospects.

The executive panel reveals in depth browser assist, together with compatibility with over 70 browser extensions. 

The stealer targets main Chromium-based browsers reminiscent of Google Chrome, Opera, and Chromium itself, in addition to Gecko-based browsers like Firefox variants. 

Standard purposes, together with Discord, Battle.web, and varied cryptocurrency wallets, are additionally throughout the malware’s scope.

Mid-Tier Risk, Prices $120 Month-to-month

The $120 month-to-month subscription mannequin positions 123 | Stealer within the mid-tier market phase of knowledge stealers. 

This pricing technique targets each novice cybercriminals and skilled risk actors in search of dependable information exfiltration instruments. The subscription mannequin ensures recurring income for malware authors whereas offering steady updates and assist to prospects.

The discussion board commercial emphasizes that customers are accountable for any detection or drive majeure occasions, indicating that malware authors are trying to restrict their legal responsibility. 

Moreover, the service explicitly prohibits operations in Russia, CIS nations, and former Soviet republics, a standard restriction amongst cybercrime providers.

At present, the malware has not obtained public evaluations from different cybercriminals on the discussion board, making its precise effectiveness unverified. 

Nevertheless, the skilled presentation of the login interface and complete administrative panel suggests vital improvement funding, indicating this can be a severe risk reasonably than a rip-off operation.

Safety researchers and organizations ought to monitor for 123 | Stealer samples and replace detection signatures to guard towards this rising risk.

Examine stay malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Advertised, Forums, Hacking, Month, Stealer, Underground

Post navigation

Previous Post: Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
Next Post: Microsoft Investigating Forms Service Issue Not Accessible for Users

Related Posts

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds Cyber Security News
North Korean Hackers Stealthy Linux Malware Leaked Online North Korean Hackers Stealthy Linux Malware Leaked Online Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News
New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys Cyber Security News
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cyber Security News
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News