Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arkanix Stealer Malware Ceases Operations Quickly

Arkanix Stealer Malware Ceases Operations Quickly

Posted on February 24, 2026 By CWS

A new cybersecurity threat, the ‘Arkanix Stealer’ malware, briefly emerged as a malware-as-a-service (MaaS) before disappearing. According to Kaspersky, this malware was implemented in both C++ and Python and became active in October 2025. However, by December, its operations ceased, with the control panel and associated Discord channel vanishing.

Arkanix Stealer’s Capabilities

Despite its short lifespan, Arkanix Stealer offered extensive information-stealing features. It was capable of collecting detailed system and user information, browser data, application specifics, as well as data from Telegram and Discord. Additionally, it targeted VPN information and files from designated directories.

The MaaS model provided users access to a control panel to configure payloads and view statistics. A tool called ChromElevator was included in the package for browser post-exploitation, which could extract cryptocurrency wallet data using the C++ variant of the malware.

Technical Deployment and Features

The Python version of the stealer was distributed via scripts bundled with PyInstaller or Nuitka, allowing dynamic configuration through GET requests to a remote server. The malware was capable of gathering comprehensive system data, including hardware specifications and installed software details, and targeted 22 browsers to extract sensitive information such as passwords, cookies, and OAuth2 data.

Moreover, Arkanix Stealer had a self-propagation feature that utilized the Discord API to spread to the victim’s contacts by sending messages. It was also noted for collecting VPN credentials from popular clients and exfiltrating files from user directories, packaging them into ZIP archives for transmission to the command-and-control server.

Operational Shutdown and Observations

Kaspersky identified two secured servers that hosted the stealer panel for victim monitoring. The developer maintained a Discord channel for user interaction and promoted a referral program to expand its reach. However, this operation was characterized as a short-term campaign aimed at rapid financial gain, ending abruptly in December 2025 without any indication of further development.

The native variant of Arkanix Stealer used VMProtect for protection, incorporated anti-analysis techniques, and targeted various types of data, including gaming files. Kaspersky’s analysis suggests that while the campaign was brief, it was sophisticated and posed a significant threat during its active period.

The disappearance of Arkanix Stealer underscores the transient nature of some cyber threats, where malware-as-a-service models are employed for quick profits before being abandoned. The lack of continued activity suggests that this particular threat may not re-emerge, but vigilance remains essential as cyber threats continue to evolve.

Security Week News Tags:Arkanix Stealer, C++, ChromElevator, cyber threat, Cybersecurity, Discord, InfoStealer, Kaspersky, MaaS, Malware, Python, VPN

Post navigation

Previous Post: Critical VMware Aria Flaws Enable Remote Code Attacks
Next Post: Steganography in Images: A New Cybersecurity Threat

Related Posts

RSAC 2026: Key Pre-Conference Announcements RSAC 2026: Key Pre-Conference Announcements Security Week News
Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Google Gemini Tricked Into Showing Phishing Message Hidden in Email  Security Week News
Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Russian Group Star Blizzard Utilizes DarkSword iOS Exploit Security Week News
Ingram Micro Restores Systems Impacted by Ransomware Ingram Micro Restores Systems Impacted by Ransomware Security Week News
Chrome Update Fixes Zero-Day Among 21 Vulnerabilities Chrome Update Fixes Zero-Day Among 21 Vulnerabilities Security Week News
Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Impostor Uses AI to Impersonate Rubio and Contact Foreign and US Officials Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data
  • Android Crypto Wallets at Risk Due to SDK Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit AiTM to Misdirect Employee Salaries
  • EngageSDK Flaw Puts Millions of Crypto Wallets at Risk
  • HPE Aruba 5G Vulnerability Allows Credential Theft
  • Exposed GitHub Copilot Flaw Risks Sensitive Data
  • Android Crypto Wallets at Risk Due to SDK Flaw

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark