August 2025 Infostealer Trend Report
This analysis examines Infostealer trends in August 2025, focusing on distribution volume, methods, and disguises. AhnLab's automated systems collect and analyze malware, providing real-time IOC services. Infostealers, often disguised as cracks, are distributed through SEO poisoning. Notable variants include LummaC2, ACRStealer, and Rhadamanthys. Distribution methods evolved from personal blogs to legitimate websites, bypassing search engine restrictions. Malware is primarily distributed as EXE files (89.7%) or through DLL-SideLoading (10.3%). Two significant trends emerged: mass distribution via Slack Marketplace and ACRStealer's domain masquerading technique, which now targets security company domains to evade detection.
AI Analysis
Technical Summary
The August 2025 Infostealer Trend Report highlights evolving tactics and distribution methods of infostealer malware, focusing on variants such as LummaC2, ACRStealer, and Rhadamanthys. Infostealers are malicious programs designed to covertly harvest sensitive information from infected systems, including credentials, personal data, and system details. Traditionally distributed via SEO poisoning—where attackers manipulate search engine results to lure victims to malicious sites—these malware families have shifted their distribution channels from personal blogs to legitimate websites, effectively bypassing search engine restrictions and increasing infection rates. The primary delivery format remains executable files (EXE) at 89.7%, with a significant minority (10.3%) using DLL SideLoading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. Two notable trends are emphasized: first, mass distribution through the Slack Marketplace, exploiting the platform's ecosystem to spread malware widely; second, ACRStealer's domain masquerading technique, which involves impersonating security company domains to evade detection and increase trustworthiness in the eyes of victims and security tools. The malware employs multiple advanced techniques aligned with MITRE ATT&CK tactics such as T1140 (Deobfuscate/Decode Files or Information), T1190 (Exploit Public-Facing Application), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1102 (Web Service), T1547.001 (Registry Run Keys/Startup Folder), T1588.002 (Obtain Capabilities: Acquire Infrastructure), T1027 (Obfuscated Files or Information), and T1573 (Encrypted Channel). These techniques facilitate stealthy persistence, lateral movement, and data exfiltration. The report does not indicate known active exploits in the wild but provides numerous file hashes for detection and blocking. Overall, this threat represents a sophisticated and adaptive infostealer campaign leveraging social engineering, supply chain abuse, and advanced evasion tactics to compromise victims.
Potential Impact
For European organizations, the impact of these infostealers can be significant. The theft of credentials and sensitive corporate data can lead to financial losses, intellectual property theft, and reputational damage. The use of Slack Marketplace for mass distribution is particularly concerning given Slack's widespread adoption in European enterprises for collaboration. Compromise via this channel could enable attackers to infiltrate multiple organizations rapidly. The domain masquerading technique targeting security company domains may undermine trust in legitimate security communications and tools, complicating incident response and detection efforts. Additionally, DLL SideLoading and process injection techniques increase the difficulty of detection by traditional antivirus and endpoint protection solutions, potentially allowing prolonged undetected access. The evolving distribution methods and obfuscation techniques suggest that standard perimeter defenses may be insufficient, increasing the risk of successful breaches. Regulatory implications under GDPR also heighten the stakes, as data breaches involving personal data can result in substantial fines and legal consequences. The medium severity rating reflects the moderate ease of exploitation combined with potentially high confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics observed in this campaign. First, enhance endpoint detection and response (EDR) capabilities to identify and block DLL SideLoading and process injection behaviors. Deploy behavioral analytics to detect anomalous Slack Marketplace app activities and restrict installation of unvetted third-party apps. Implement strict application whitelisting and code-signing policies to prevent execution of unauthorized EXE files. Conduct regular threat hunting using the provided malware hashes and indicators of compromise (IOCs) to identify potential infections early. Strengthen web filtering and DNS security to mitigate SEO poisoning risks by blocking access to known malicious domains and URLs. Educate employees on the risks of downloading cracks or unauthorized software, emphasizing the dangers of SEO-poisoned search results. Monitor network traffic for encrypted channels and unusual outbound connections that may indicate data exfiltration. Finally, maintain up-to-date incident response plans that include scenarios involving supply chain abuse and domain masquerading to ensure rapid containment and remediation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium
Indicators of Compromise
- hash: 00a2e097c53831491975374ef4cdf5b4
- hash: 013026855baf28301bd7e6e85822e4e5
- hash: 081b5fb48eab820ccf47065e724cc9b6
- hash: 11f03aef854cc2032db0771b7b7166fb
- hash: 169620bc6fb5e9753d913275b2352686
- hash: 1106be0ea0ad6323bee88c8e85f0a0eed2ea7251
- hash: 13e9e3c8bc38c2730a35b3b7797a95e3eb2bdc14
- hash: 513c7c99a4b47f67cf34f7f6c4dd28c5217bf9a2
- hash: d773f53ca94acfb3df5cfa7ae87b0632608072ff
- hash: 020086975001e27c95565f8040b7e637fbee03497b950f8c0cae4ed7a3d1074f
- hash: 3137451920d1843a381904d3227caaffa9745a3eb99d40786524a2313589e9e0
- hash: b5013ef4816a0aa0f82f1af06204c59b6cb7a491d44233f99b2545cd127d0a34
- hash: c1243c763c8e20be71f380e5366060a73c4a80711d0d0018d4020b6051563101
August 2025 Infostealer Trend Report
Description
This analysis examines Infostealer trends in August 2025, focusing on distribution volume, methods, and disguises. AhnLab's automated systems collect and analyze malware, providing real-time IOC services. Infostealers, often disguised as cracks, are distributed through SEO poisoning. Notable variants include LummaC2, ACRStealer, and Rhadamanthys. Distribution methods evolved from personal blogs to legitimate websites, bypassing search engine restrictions. Malware is primarily distributed as EXE files (89.7%) or through DLL-SideLoading (10.3%). Two significant trends emerged: mass distribution via Slack Marketplace and ACRStealer's domain masquerading technique, which now targets security company domains to evade detection.
AI-Powered Analysis
Technical Analysis
The August 2025 Infostealer Trend Report highlights evolving tactics and distribution methods of infostealer malware, focusing on variants such as LummaC2, ACRStealer, and Rhadamanthys. Infostealers are malicious programs designed to covertly harvest sensitive information from infected systems, including credentials, personal data, and system details. Traditionally distributed via SEO poisoning—where attackers manipulate search engine results to lure victims to malicious sites—these malware families have shifted their distribution channels from personal blogs to legitimate websites, effectively bypassing search engine restrictions and increasing infection rates. The primary delivery format remains executable files (EXE) at 89.7%, with a significant minority (10.3%) using DLL SideLoading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. Two notable trends are emphasized: first, mass distribution through the Slack Marketplace, exploiting the platform's ecosystem to spread malware widely; second, ACRStealer's domain masquerading technique, which involves impersonating security company domains to evade detection and increase trustworthiness in the eyes of victims and security tools. The malware employs multiple advanced techniques aligned with MITRE ATT&CK tactics such as T1140 (Deobfuscate/Decode Files or Information), T1190 (Exploit Public-Facing Application), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1102 (Web Service), T1547.001 (Registry Run Keys/Startup Folder), T1588.002 (Obtain Capabilities: Acquire Infrastructure), T1027 (Obfuscated Files or Information), and T1573 (Encrypted Channel). These techniques facilitate stealthy persistence, lateral movement, and data exfiltration. The report does not indicate known active exploits in the wild but provides numerous file hashes for detection and blocking. Overall, this threat represents a sophisticated and adaptive infostealer campaign leveraging social engineering, supply chain abuse, and advanced evasion tactics to compromise victims.
Potential Impact
For European organizations, the impact of these infostealers can be significant. The theft of credentials and sensitive corporate data can lead to financial losses, intellectual property theft, and reputational damage. The use of Slack Marketplace for mass distribution is particularly concerning given Slack's widespread adoption in European enterprises for collaboration. Compromise via this channel could enable attackers to infiltrate multiple organizations rapidly. The domain masquerading technique targeting security company domains may undermine trust in legitimate security communications and tools, complicating incident response and detection efforts. Additionally, DLL SideLoading and process injection techniques increase the difficulty of detection by traditional antivirus and endpoint protection solutions, potentially allowing prolonged undetected access. The evolving distribution methods and obfuscation techniques suggest that standard perimeter defenses may be insufficient, increasing the risk of successful breaches. Regulatory implications under GDPR also heighten the stakes, as data breaches involving personal data can result in substantial fines and legal consequences. The medium severity rating reflects the moderate ease of exploitation combined with potentially high confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics observed in this campaign. First, enhance endpoint detection and response (EDR) capabilities to identify and block DLL SideLoading and process injection behaviors. Deploy behavioral analytics to detect anomalous Slack Marketplace app activities and restrict installation of unvetted third-party apps. Implement strict application whitelisting and code-signing policies to prevent execution of unauthorized EXE files. Conduct regular threat hunting using the provided malware hashes and indicators of compromise (IOCs) to identify potential infections early. Strengthen web filtering and DNS security to mitigate SEO poisoning risks by blocking access to known malicious domains and URLs. Educate employees on the risks of downloading cracks or unauthorized software, emphasizing the dangers of SEO-poisoned search results. Monitor network traffic for encrypted channels and unusual outbound connections that may indicate data exfiltration. Finally, maintain up-to-date incident response plans that include scenarios involving supply chain abuse and domain masquerading to ensure rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/90154"]
- Adversary
- null
- Pulse Id
- 68c968be19f98a976a9f43b3
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash00a2e097c53831491975374ef4cdf5b4 | — | |
hash013026855baf28301bd7e6e85822e4e5 | — | |
hash081b5fb48eab820ccf47065e724cc9b6 | — | |
hash11f03aef854cc2032db0771b7b7166fb | — | |
hash169620bc6fb5e9753d913275b2352686 | — | |
hash1106be0ea0ad6323bee88c8e85f0a0eed2ea7251 | — | |
hash13e9e3c8bc38c2730a35b3b7797a95e3eb2bdc14 | — | |
hash513c7c99a4b47f67cf34f7f6c4dd28c5217bf9a2 | — | |
hashd773f53ca94acfb3df5cfa7ae87b0632608072ff | — | |
hash020086975001e27c95565f8040b7e637fbee03497b950f8c0cae4ed7a3d1074f | — | |
hash3137451920d1843a381904d3227caaffa9745a3eb99d40786524a2313589e9e0 | — | |
hashb5013ef4816a0aa0f82f1af06204c59b6cb7a491d44233f99b2545cd127d0a34 | — | |
hashc1243c763c8e20be71f380e5366060a73c4a80711d0d0018d4020b6051563101 | — |
Threat ID: 68c973c5ba2489d7522e0b2b
Added to database: 9/16/2025, 2:27:17 PM
Last enriched: 9/16/2025, 2:31:44 PM
Last updated: 9/17/2025, 2:39:26 AM
Views: 6
Related Threats
Ongoing FileFix Attack Installs StealC Infostealer Via Fake Facebook Pages
MediumAppSuite, OneStart & ManualFinder: The Nexus of Deception
MediumFileFix in the wild! New FileFix campaign goes beyond POC and leverages steganography
MediumAugust 2025 APT Attack Trends Report
MediumLockerGoga Ransomware Admin on EU Most Wanted List With $10M DOJ Reward
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.