
A
new
Golang-based
information
stealer
malware
dubbed
Titan
Stealer
is
being
advertised
by
threat
actors
through
their
Telegram
channel.
“The
stealer
is
capable
of
stealing
a
variety
of
information
from
infected
Windows
machines,
including
credential
data
from
browsers
and
crypto
wallets,
FTP
client
details,
screenshots,
system
information,
and
grabbed
files,”
Uptycs
security
researchers
Karthickkumar
Kathiresan
and
Shilpesh
Trivedi
said
in
a
recent
report.
Details
of
the
malware
were
first
documented
by
cybersecurity
researcher
Will
Thomas
(@BushidoToken)
in
November
2022
by
querying
the
IoT
search
engine
Shodan.
Titan
is
offered
as
a
builder,
enabling
customers
to
customize
the
malware
binary
to
include
specific
functionalities
and
the
kind
of
information
to
be
exfiltrated
from
a
victim’s
machine.
The
malware,
upon
execution,
employs
a
technique
known
as
process
hollowing
to
inject
the
malicious
payload
into
the
memory
of
a
legitimate
process
known
as
AppLaunch.exe,
which
is
the
Microsoft
.NET
ClickOnce
Launch
Utility.
Some
of
the
major
web
browsers
targeted
by
Titan
Stealer
include
Google
Chrome,
Mozilla
Firefox,
Microsoft
Edge,
Yandex,
Opera,
Brave,
Vivaldi,
7
Star
Browser,
Iridium
Browser,
and
others.
The
crypto
wallets
singled
out
are
Armory,
Armory,
Bytecoin,
Coinomi,
Edge
Wallet,
Ethereum,
Exodus,
Guarda,
Jaxx
Liberty,
and
Zcash.
It’s
also
capable
of
gathering
the
list
of
installed
applications
on
the
compromised
host
and
capturing
data
associated
with
the
Telegram
desktop
app.
The
amassed
information
is
subsequently
transmitted
to
a
remote
server
under
the
attacker’s
control
as
a
Base64-encoded
archive
file.
Furthermore,
the
malware
comes
with
a
web
panel
that
enables
adversaries
to
access
the
stolen
data.
The
exact
modus
operandi
used
to
distribute
the
malware
is
unclear
as
yet,
but
traditionally
threat
actors
have
leveraged
a
number
of
methods,
such
as
phishing,
malicious
ads,
and
cracked
software.
“One
of
the
primary
reasons
[threat
actors]
may
be
using
Golang
for
their
information
stealer
malware
is
because
it
allows
them
to
easily
create
cross-platform
malware
that
can
run
on
multiple
operating
systems,
such
as
Windows,
Linux,
and
macOS,”
Cyble
said
in
its
own
analysis
of
Titan
Stealer.
“Additionally,
the
Go
compiled
binary
files
are
small
in
size,
making
them
more
difficult
to
detect
by
security
software.”
The
development
arrives
a
little
over
two
months
after
SEKOIA
detailed
another
Go-based
malware
referred
to
as
Aurora
Stealer
that’s
being
put
to
use
by
several
criminal
actors
in
their
campaigns.
The
malware
is
typically
propagated
via
lookalike
websites
of
popular
software,
with
the
same
domains
actively
updated
to
host
trojanized
versions
of
different
applications.
It
has
also
been
observed
taking
advantage
of
a
method
known
as
padding
to
artificially
inflate
the
size
of
the
executables
to
as
much
as
260MB
by
adding
random
data
so
as
to
evade
detection
by
antivirus
software.
The
findings
come
close
on
the
heels
of
a
malware
campaign
that
has
been
observed
delivering
Raccoon
and
Vidar
using
hundreds
of
fake
websites
masquerading
as
legitimate
software
and
games.
Team
Cymru,
in
an
analysis
published
earlier
this
month,
noted
that “Vidar
operators
have
split
their
infrastructure
into
two
parts;
one
dedicated
to
their
regular
customers
and
the
other
for
the
management
team,
and
also
potentially
premium
/
important
users.”