Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Fickle Stealer Targets Windows Systems

June 20, 2024
Reading Time: 3 mins read
in Alerts
Fickle Stealer Targets Windows Systems

Hackers are increasingly using stealers like Fickle Stealer to steal login credentials, financial data, and other sensitive information from infected computer systems. Fickle Stealer, a sophisticated Rust-based malware, has been actively targeting Windows machines, as recently discovered by cybersecurity researchers at Fortinet. This malware is delivered through various methods, including VBA droppers and executable downloaders, and evades detection through innovative techniques like code injection and communication via Telegram.

Once installed, Fickle Stealer initiates anti-analysis checks, detects debuggers, and gathers system information. It creates a folder in the Temp directory, copies itself, and communicates with its command-and-control (C2) server. The server responds with an encrypted target list, guiding the malware to steal data from specific crypto wallets, plugins, file extensions, and paths. The stolen data is then compressed, encoded in a JSON format, and exfiltrated to the C2 server.

Fickle Stealer’s ability to adapt and update its target list makes it a significant threat, as it can continuously evolve and target new applications. It searches for sensitive data in common installation directories and receives frequent updates from its C2 server, enabling it to stay ahead of traditional security measures. This emphasizes the need for robust security solutions to monitor and protect against such advanced threats.

To mitigate the risks posed by Fickle Stealer, Fortinet recommends regularly updating detection systems, educating users about the dangers of downloading unapproved software, and implementing strict security controls. By doing so, organizations can better protect themselves against these evolving threats and ensure the safety of their sensitive data. Fortinet’s findings highlight the importance of staying vigilant and proactive in the ever-changing landscape of cybersecurity.

Reference:

  • Rust-Based Fickle Stealer Malware Targets Windows Users via Multiple Attack Chain
Tags: Cyber Alerts 2024Cyber RiskCyber threatFickle StealerFortinetHackersJune 2024Rust-based malwareTelegramWindows
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial