Skip to main content

August 2025 Infostealer Trend Report

Medium
Published: Tue Sep 16 2025 (09/16/2025, 13:40:14 UTC)
Source: AlienVault OTX General

Description

This analysis examines Infostealer trends in August 2025, focusing on distribution volume, methods, and disguises. AhnLab's automated systems collect and analyze malware, providing real-time IOC services. Infostealers, often disguised as cracks, are distributed through SEO poisoning. Notable variants include LummaC2, ACRStealer, and Rhadamanthys. Distribution methods evolved from personal blogs to legitimate websites, bypassing search engine restrictions. Malware is primarily distributed as EXE files (89.7%) or through DLL-SideLoading (10.3%). Two significant trends emerged: mass distribution via Slack Marketplace and ACRStealer's domain masquerading technique, which now targets security company domains to evade detection.

AI-Powered Analysis

AILast updated: 09/16/2025, 14:31:44 UTC

Technical Analysis

The August 2025 Infostealer Trend Report highlights evolving tactics and distribution methods of infostealer malware, focusing on variants such as LummaC2, ACRStealer, and Rhadamanthys. Infostealers are malicious programs designed to covertly harvest sensitive information from infected systems, including credentials, personal data, and system details. Traditionally distributed via SEO poisoning—where attackers manipulate search engine results to lure victims to malicious sites—these malware families have shifted their distribution channels from personal blogs to legitimate websites, effectively bypassing search engine restrictions and increasing infection rates. The primary delivery format remains executable files (EXE) at 89.7%, with a significant minority (10.3%) using DLL SideLoading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. Two notable trends are emphasized: first, mass distribution through the Slack Marketplace, exploiting the platform's ecosystem to spread malware widely; second, ACRStealer's domain masquerading technique, which involves impersonating security company domains to evade detection and increase trustworthiness in the eyes of victims and security tools. The malware employs multiple advanced techniques aligned with MITRE ATT&CK tactics such as T1140 (Deobfuscate/Decode Files or Information), T1190 (Exploit Public-Facing Application), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1102 (Web Service), T1547.001 (Registry Run Keys/Startup Folder), T1588.002 (Obtain Capabilities: Acquire Infrastructure), T1027 (Obfuscated Files or Information), and T1573 (Encrypted Channel). These techniques facilitate stealthy persistence, lateral movement, and data exfiltration. The report does not indicate known active exploits in the wild but provides numerous file hashes for detection and blocking. Overall, this threat represents a sophisticated and adaptive infostealer campaign leveraging social engineering, supply chain abuse, and advanced evasion tactics to compromise victims.

Potential Impact

For European organizations, the impact of these infostealers can be significant. The theft of credentials and sensitive corporate data can lead to financial losses, intellectual property theft, and reputational damage. The use of Slack Marketplace for mass distribution is particularly concerning given Slack's widespread adoption in European enterprises for collaboration. Compromise via this channel could enable attackers to infiltrate multiple organizations rapidly. The domain masquerading technique targeting security company domains may undermine trust in legitimate security communications and tools, complicating incident response and detection efforts. Additionally, DLL SideLoading and process injection techniques increase the difficulty of detection by traditional antivirus and endpoint protection solutions, potentially allowing prolonged undetected access. The evolving distribution methods and obfuscation techniques suggest that standard perimeter defenses may be insufficient, increasing the risk of successful breaches. Regulatory implications under GDPR also heighten the stakes, as data breaches involving personal data can result in substantial fines and legal consequences. The medium severity rating reflects the moderate ease of exploitation combined with potentially high confidentiality and integrity impacts if successful.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the specific tactics observed in this campaign. First, enhance endpoint detection and response (EDR) capabilities to identify and block DLL SideLoading and process injection behaviors. Deploy behavioral analytics to detect anomalous Slack Marketplace app activities and restrict installation of unvetted third-party apps. Implement strict application whitelisting and code-signing policies to prevent execution of unauthorized EXE files. Conduct regular threat hunting using the provided malware hashes and indicators of compromise (IOCs) to identify potential infections early. Strengthen web filtering and DNS security to mitigate SEO poisoning risks by blocking access to known malicious domains and URLs. Educate employees on the risks of downloading cracks or unauthorized software, emphasizing the dangers of SEO-poisoned search results. Monitor network traffic for encrypted channels and unusual outbound connections that may indicate data exfiltration. Finally, maintain up-to-date incident response plans that include scenarios involving supply chain abuse and domain masquerading to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/90154"]
Adversary
null
Pulse Id
68c968be19f98a976a9f43b3
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash00a2e097c53831491975374ef4cdf5b4
hash013026855baf28301bd7e6e85822e4e5
hash081b5fb48eab820ccf47065e724cc9b6
hash11f03aef854cc2032db0771b7b7166fb
hash169620bc6fb5e9753d913275b2352686
hash1106be0ea0ad6323bee88c8e85f0a0eed2ea7251
hash13e9e3c8bc38c2730a35b3b7797a95e3eb2bdc14
hash513c7c99a4b47f67cf34f7f6c4dd28c5217bf9a2
hashd773f53ca94acfb3df5cfa7ae87b0632608072ff
hash020086975001e27c95565f8040b7e637fbee03497b950f8c0cae4ed7a3d1074f
hash3137451920d1843a381904d3227caaffa9745a3eb99d40786524a2313589e9e0
hashb5013ef4816a0aa0f82f1af06204c59b6cb7a491d44233f99b2545cd127d0a34
hashc1243c763c8e20be71f380e5366060a73c4a80711d0d0018d4020b6051563101

Threat ID: 68c973c5ba2489d7522e0b2b

Added to database: 9/16/2025, 2:27:17 PM

Last enriched: 9/16/2025, 2:31:44 PM

Last updated: 9/17/2025, 2:39:26 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats