Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

New Maranhão Stealer Via Pirated Software Leveraging Cloud-Hosted Platforms to Steal Login Credentials

Posted on September 16, 2025September 16, 2025 By CWS

Since Could 2025, a novel credential stealer dubbed Maranhão Stealer has emerged as a big risk to customers of pirated gaming software program. Distributed by misleading web sites internet hosting cracked launchers and cheats, the malware leverages cloud-hosted platforms to ship trojanized installers that seem innocuous.

Upon execution, the installer unpacks a Node.js–compiled binary encapsulated in an Inno Setup executable, initiating a silent an infection course of that avoids person detection whereas harvesting delicate information.

In its preliminary campaigns, risk actors attracted victims with attractive obtain hyperlinks similar to DerelictSetup.zip, promising modified sport content material.

Behind the scenes, nonetheless, the Inno Setup wrapper drops a number of elements, together with updater.exe, crypto.key, and infoprocess.exe, right into a hidden “Microsoft Updater” listing underneath %localappdatapercentPrograms.

An infection chain (Supply – Cyble)

Cyble analysts famous that the malware establishes persistence by Run registry keys and scheduled duties instantly after deployment.

The impression of Maranhão Stealer extends past easy credential theft. By injecting a reflective DLL into browser processes, it bypasses safety measures like AppBound encryption to exfiltrate saved passwords, cookies, and looking historical past from Chrome, Edge, Courageous, Opera, and different Chromium-based browsers.

Cyble researchers recognized that the malware additionally targets cryptocurrency wallets—Electrum, Exodus, Coinomi, and extra—making it a twin risk to each conventional account credentials and digital asset wallets.

Along with credential harvesting, Maranhão Stealer conducts intensive system reconnaissance. It gathers {hardware} and community info through WMI queries similar to wmic os get Caption and exterior API calls to ip-api.com/json, profiling the working system, CPU, disk house, and geographic location of the contaminated host.

Screenshots captured by inline C# in PowerShell additional increase the stolen intelligence, enabling risk actors to observe person exercise in actual time.

An infection Mechanism

A better examination of the an infection mechanism reveals a multi-stage course of designed for stealth and reliability.

Upon execution of the Inno Setup installer, the principle payload (updater.exe) is launched in /VERYSILENT mode, suppressing any set up dialogs.

Persistence is straight away secured with a registry modification:-

reg.exe ADD HKCUSoftwareMicrosoftWindowsCurrentVersionRun /v updater /t REG_SZ /d “C:CustomersAppDataLocalProgramsMicrosoft UpdaterUpdater.exe” /f

Persistence by registry (Supply – Cyble)

As soon as the Run key’s in place, the malware marks its listing and recordsdata with hidden and system attributes by attrib +h +s, making certain they continue to be obscured from informal inspection.

The subsequent section includes spawning a helper course of, infoprocess.exe, which injects a payload DLL instantly into working browser processes.

Utilizing low-level Home windows APIs—NtAllocateVirtualMemory, NtWriteProcessMemory, and CreateThreadEx—the malicious module is mapped into the goal’s reminiscence house with out touching the disk.

This reflective injection approach not solely evades antivirus scans but additionally runs contained in the context of legit browser executables, making detection much more difficult.

By combining social engineering, cloud-based distribution, and superior injection ways, Maranhão Stealer exemplifies the evolving sophistication of contemporary credential stealers.

Safety groups ought to prioritize software management insurance policies, endpoint monitoring for anomalous registry edits, and behavioral evaluation to detect and block such stealthy threats of their early phases.

Free reside webinar on new malware ways from our analysts! Study superior detection strategies -> Register for Free

Cyber Security News Tags:CloudHosted, Credentials, Leveraging, Login, Maranhão, Pirated, Platforms, Software, Steal, Stealer

Post navigation

Previous Post: Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
Next Post: Open Source CyberSOCEval Sets New Standards for AI in Malware Analysis and Threat Intelligence

Related Posts

Critical Vulnerability in MongoDB Risks Data Exposure Critical Vulnerability in MongoDB Risks Data Exposure Cyber Security News
GitLab SSRF Vulnerability Exploited: CISA Issues Warning GitLab SSRF Vulnerability Exploited: CISA Issues Warning Cyber Security News
Crunchyroll User Data Breach Exposes 100 GB of Information Crunchyroll User Data Breach Exposes 100 GB of Information Cyber Security News
Hackers Exploit GitHub with Fake AI Repositories Hackers Exploit GitHub with Fake AI Repositories Cyber Security News
Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange Cyber Security News
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark