The criminal behind Typhon Reborn, an information-stealing malware, has returned with an updated version, known as V2. The latest version has enhanced capabilities to resist analysis and evade detection, and it is available for purchase on the criminal underground for a monthly fee of $59, a yearly fee of $360, or a lifetime subscription of $540.
V2 is a stealer that can collect and exfiltrate sensitive data and send the stolen data to attackers using the Telegram API.
Typhon Reborn was initially reported in November 2022 by Palo Alto Networks Unit 42. The new version removes some of the previous version’s features, including keylogging and cryptocurrency mining, to reduce the risk of detection.
V2 malware is also based on another stealer malware called Prynt Stealer, and it can deploy the XMRig cryptocurrency miner. The malware is equipped to siphon passwords and cookies from Chromium-based web browsers, along with data from instant messaging, gaming, and crypto wallet apps.
Besides incorporating more anti-analysis and anti-virtualization checks, the new version removes its persistence features, opting instead to terminate itself after exfiltrating data.
The V2 variant was offered for sale by its developer on January 31, 2023, on the Russian-language dark web forum XSS. The malware is capable of avoiding infecting systems located in the Commonwealth of Independent States (CIS) countries but excludes Ukraine and Georgia from the list.
The malware’s collected data is transmitted in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform. The archive is deleted from the infected system after the data has been successfully transmitted to the attacker, and the malware then calls a self-delete function to terminate execution.
Cyble has disclosed another Python-based stealer malware, named Creal, that targets cryptocurrency users through phishing sites resembling legitimate crypto mining services such as Kryptex.
The malware is equipped to siphon cookies and passwords from Chromium-based web browsers, data from instant messaging, gaming, and crypto wallet apps, and can exfiltrate data using Discord webhooks and file-hosting and sharing platforms such as Anonfiles and Gofile.