Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arkanix Stealer Malware Ceases Operations Quickly

Arkanix Stealer Malware Ceases Operations Quickly

Posted on February 24, 2026 By CWS

A new cybersecurity threat, the ‘Arkanix Stealer’ malware, briefly emerged as a malware-as-a-service (MaaS) before disappearing. According to Kaspersky, this malware was implemented in both C++ and Python and became active in October 2025. However, by December, its operations ceased, with the control panel and associated Discord channel vanishing.

Arkanix Stealer’s Capabilities

Despite its short lifespan, Arkanix Stealer offered extensive information-stealing features. It was capable of collecting detailed system and user information, browser data, application specifics, as well as data from Telegram and Discord. Additionally, it targeted VPN information and files from designated directories.

The MaaS model provided users access to a control panel to configure payloads and view statistics. A tool called ChromElevator was included in the package for browser post-exploitation, which could extract cryptocurrency wallet data using the C++ variant of the malware.

Technical Deployment and Features

The Python version of the stealer was distributed via scripts bundled with PyInstaller or Nuitka, allowing dynamic configuration through GET requests to a remote server. The malware was capable of gathering comprehensive system data, including hardware specifications and installed software details, and targeted 22 browsers to extract sensitive information such as passwords, cookies, and OAuth2 data.

Moreover, Arkanix Stealer had a self-propagation feature that utilized the Discord API to spread to the victim’s contacts by sending messages. It was also noted for collecting VPN credentials from popular clients and exfiltrating files from user directories, packaging them into ZIP archives for transmission to the command-and-control server.

Operational Shutdown and Observations

Kaspersky identified two secured servers that hosted the stealer panel for victim monitoring. The developer maintained a Discord channel for user interaction and promoted a referral program to expand its reach. However, this operation was characterized as a short-term campaign aimed at rapid financial gain, ending abruptly in December 2025 without any indication of further development.

The native variant of Arkanix Stealer used VMProtect for protection, incorporated anti-analysis techniques, and targeted various types of data, including gaming files. Kaspersky’s analysis suggests that while the campaign was brief, it was sophisticated and posed a significant threat during its active period.

The disappearance of Arkanix Stealer underscores the transient nature of some cyber threats, where malware-as-a-service models are employed for quick profits before being abandoned. The lack of continued activity suggests that this particular threat may not re-emerge, but vigilance remains essential as cyber threats continue to evolve.

Security Week News Tags:Arkanix Stealer, C++, ChromElevator, cyber threat, Cybersecurity, Discord, InfoStealer, Kaspersky, MaaS, Malware, Python, VPN

Post navigation

Previous Post: Critical VMware Aria Flaws Enable Remote Code Attacks
Next Post: Steganography in Images: A New Cybersecurity Threat

Related Posts

New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites Security Week News
Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases Security Week News
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island Russian Hacking Suspect Wanted by the FBI Arrested on Thai Resort Island Security Week News
Flare Raises  Million for Threat Exposure Management Platform Flare Raises $30 Million for Threat Exposure Management Platform Security Week News
Furl Raises  Million for Autonomous Vulnerability Remediation Furl Raises $10 Million for Autonomous Vulnerability Remediation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor
  • Steganography in Images: A New Cybersecurity Threat
  • Arkanix Stealer Malware Ceases Operations Quickly
  • Critical VMware Aria Flaws Enable Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor
  • Steganography in Images: A New Cybersecurity Threat
  • Arkanix Stealer Malware Ceases Operations Quickly
  • Critical VMware Aria Flaws Enable Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News