August 2025 Infostealer Trend Report
This analysis examines Infostealer trends in August 2025, focusing on distribution volume, methods, and disguises. AhnLab's automated systems collect and analyze malware, providing real-time IOC services. Infostealers, often disguised as cracks, are distributed through SEO poisoning. Notable variants include LummaC2, ACRStealer, and Rhadamanthys. Distribution methods evolved from personal blogs to legitimate websites, bypassing search engine restrictions. Malware is primarily distributed as EXE files (89.7%) or through DLL-SideLoading (10.3%). Two significant trends emerged: mass distribution via Slack Marketplace and ACRStealer's domain masquerading technique, which now targets security company domains to evade detection.
AI Analysis
Technical Summary
The August 2025 Infostealer Trend Report highlights evolving tactics and distribution methods of infostealer malware, focusing on variants such as LummaC2, ACRStealer, and Rhadamanthys. Infostealers are malicious programs designed to covertly harvest sensitive information from infected systems, including credentials, personal data, and system details. Traditionally distributed via SEO poisoning—where attackers manipulate search engine results to lure victims to malicious sites—these malware families have shifted their distribution channels from personal blogs to legitimate websites, effectively bypassing search engine restrictions and increasing infection rates. The primary delivery format remains executable files (EXE) at 89.7%, with a significant minority (10.3%) using DLL SideLoading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. Two notable trends are emphasized: first, mass distribution through the Slack Marketplace, exploiting the platform's ecosystem to spread malware widely; second, ACRStealer's domain masquerading technique, which involves impersonating security company domains to evade detection and increase trustworthiness in the eyes of victims and security tools. The malware employs multiple advanced techniques aligned with MITRE ATT&CK tactics such as T1140 (Deobfuscate/Decode Files or Information), T1190 (Exploit Public-Facing Application), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1102 (Web Service), T1547.001 (Registry Run Keys/Startup Folder), T1588.002 (Obtain Capabilities: Acquire Infrastructure), T1027 (Obfuscated Files or Information), and T1573 (Encrypted Channel). These techniques facilitate stealthy persistence, lateral movement, and data exfiltration. The report does not indicate known active exploits in the wild but provides numerous file hashes for detection and blocking. Overall, this threat represents a sophisticated and adaptive infostealer campaign leveraging social engineering, supply chain abuse, and advanced evasion tactics to compromise victims.
Potential Impact
For European organizations, the impact of these infostealers can be significant. The theft of credentials and sensitive corporate data can lead to financial losses, intellectual property theft, and reputational damage. The use of Slack Marketplace for mass distribution is particularly concerning given Slack's widespread adoption in European enterprises for collaboration. Compromise via this channel could enable attackers to infiltrate multiple organizations rapidly. The domain masquerading technique targeting security company domains may undermine trust in legitimate security communications and tools, complicating incident response and detection efforts. Additionally, DLL SideLoading and process injection techniques increase the difficulty of detection by traditional antivirus and endpoint protection solutions, potentially allowing prolonged undetected access. The evolving distribution methods and obfuscation techniques suggest that standard perimeter defenses may be insufficient, increasing the risk of successful breaches. Regulatory implications under GDPR also heighten the stakes, as data breaches involving personal data can result in substantial fines and legal consequences. The medium severity rating reflects the moderate ease of exploitation combined with potentially high confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics observed in this campaign. First, enhance endpoint detection and response (EDR) capabilities to identify and block DLL SideLoading and process injection behaviors. Deploy behavioral analytics to detect anomalous Slack Marketplace app activities and restrict installation of unvetted third-party apps. Implement strict application whitelisting and code-signing policies to prevent execution of unauthorized EXE files. Conduct regular threat hunting using the provided malware hashes and indicators of compromise (IOCs) to identify potential infections early. Strengthen web filtering and DNS security to mitigate SEO poisoning risks by blocking access to known malicious domains and URLs. Educate employees on the risks of downloading cracks or unauthorized software, emphasizing the dangers of SEO-poisoned search results. Monitor network traffic for encrypted channels and unusual outbound connections that may indicate data exfiltration. Finally, maintain up-to-date incident response plans that include scenarios involving supply chain abuse and domain masquerading to ensure rapid containment and remediation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium
Indicators of Compromise
- hash: 00a2e097c53831491975374ef4cdf5b4
- hash: 013026855baf28301bd7e6e85822e4e5
- hash: 081b5fb48eab820ccf47065e724cc9b6
- hash: 11f03aef854cc2032db0771b7b7166fb
- hash: 169620bc6fb5e9753d913275b2352686
- hash: 1106be0ea0ad6323bee88c8e85f0a0eed2ea7251
- hash: 13e9e3c8bc38c2730a35b3b7797a95e3eb2bdc14
- hash: 513c7c99a4b47f67cf34f7f6c4dd28c5217bf9a2
- hash: d773f53ca94acfb3df5cfa7ae87b0632608072ff
- hash: 020086975001e27c95565f8040b7e637fbee03497b950f8c0cae4ed7a3d1074f
- hash: 3137451920d1843a381904d3227caaffa9745a3eb99d40786524a2313589e9e0
- hash: b5013ef4816a0aa0f82f1af06204c59b6cb7a491d44233f99b2545cd127d0a34
- hash: c1243c763c8e20be71f380e5366060a73c4a80711d0d0018d4020b6051563101
August 2025 Infostealer Trend Report
Description
This analysis examines Infostealer trends in August 2025, focusing on distribution volume, methods, and disguises. AhnLab's automated systems collect and analyze malware, providing real-time IOC services. Infostealers, often disguised as cracks, are distributed through SEO poisoning. Notable variants include LummaC2, ACRStealer, and Rhadamanthys. Distribution methods evolved from personal blogs to legitimate websites, bypassing search engine restrictions. Malware is primarily distributed as EXE files (89.7%) or through DLL-SideLoading (10.3%). Two significant trends emerged: mass distribution via Slack Marketplace and ACRStealer's domain masquerading technique, which now targets security company domains to evade detection.
AI-Powered Analysis
Technical Analysis
The August 2025 Infostealer Trend Report highlights evolving tactics and distribution methods of infostealer malware, focusing on variants such as LummaC2, ACRStealer, and Rhadamanthys. Infostealers are malicious programs designed to covertly harvest sensitive information from infected systems, including credentials, personal data, and system details. Traditionally distributed via SEO poisoning—where attackers manipulate search engine results to lure victims to malicious sites—these malware families have shifted their distribution channels from personal blogs to legitimate websites, effectively bypassing search engine restrictions and increasing infection rates. The primary delivery format remains executable files (EXE) at 89.7%, with a significant minority (10.3%) using DLL SideLoading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. Two notable trends are emphasized: first, mass distribution through the Slack Marketplace, exploiting the platform's ecosystem to spread malware widely; second, ACRStealer's domain masquerading technique, which involves impersonating security company domains to evade detection and increase trustworthiness in the eyes of victims and security tools. The malware employs multiple advanced techniques aligned with MITRE ATT&CK tactics such as T1140 (Deobfuscate/Decode Files or Information), T1190 (Exploit Public-Facing Application), T1055 (Process Injection), T1059 (Command and Scripting Interpreter), T1102 (Web Service), T1547.001 (Registry Run Keys/Startup Folder), T1588.002 (Obtain Capabilities: Acquire Infrastructure), T1027 (Obfuscated Files or Information), and T1573 (Encrypted Channel). These techniques facilitate stealthy persistence, lateral movement, and data exfiltration. The report does not indicate known active exploits in the wild but provides numerous file hashes for detection and blocking. Overall, this threat represents a sophisticated and adaptive infostealer campaign leveraging social engineering, supply chain abuse, and advanced evasion tactics to compromise victims.
Potential Impact
For European organizations, the impact of these infostealers can be significant. The theft of credentials and sensitive corporate data can lead to financial losses, intellectual property theft, and reputational damage. The use of Slack Marketplace for mass distribution is particularly concerning given Slack's widespread adoption in European enterprises for collaboration. Compromise via this channel could enable attackers to infiltrate multiple organizations rapidly. The domain masquerading technique targeting security company domains may undermine trust in legitimate security communications and tools, complicating incident response and detection efforts. Additionally, DLL SideLoading and process injection techniques increase the difficulty of detection by traditional antivirus and endpoint protection solutions, potentially allowing prolonged undetected access. The evolving distribution methods and obfuscation techniques suggest that standard perimeter defenses may be insufficient, increasing the risk of successful breaches. Regulatory implications under GDPR also heighten the stakes, as data breaches involving personal data can result in substantial fines and legal consequences. The medium severity rating reflects the moderate ease of exploitation combined with potentially high confidentiality and integrity impacts if successful.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics observed in this campaign. First, enhance endpoint detection and response (EDR) capabilities to identify and block DLL SideLoading and process injection behaviors. Deploy behavioral analytics to detect anomalous Slack Marketplace app activities and restrict installation of unvetted third-party apps. Implement strict application whitelisting and code-signing policies to prevent execution of unauthorized EXE files. Conduct regular threat hunting using the provided malware hashes and indicators of compromise (IOCs) to identify potential infections early. Strengthen web filtering and DNS security to mitigate SEO poisoning risks by blocking access to known malicious domains and URLs. Educate employees on the risks of downloading cracks or unauthorized software, emphasizing the dangers of SEO-poisoned search results. Monitor network traffic for encrypted channels and unusual outbound connections that may indicate data exfiltration. Finally, maintain up-to-date incident response plans that include scenarios involving supply chain abuse and domain masquerading to ensure rapid containment and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/90154"]
- Adversary
- null
- Pulse Id
- 68c968be19f98a976a9f43b3
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash00a2e097c53831491975374ef4cdf5b4 | — | |
hash013026855baf28301bd7e6e85822e4e5 | — | |
hash081b5fb48eab820ccf47065e724cc9b6 | — | |
hash11f03aef854cc2032db0771b7b7166fb | — | |
hash169620bc6fb5e9753d913275b2352686 | — | |
hash1106be0ea0ad6323bee88c8e85f0a0eed2ea7251 | — | |
hash13e9e3c8bc38c2730a35b3b7797a95e3eb2bdc14 | — | |
hash513c7c99a4b47f67cf34f7f6c4dd28c5217bf9a2 | — | |
hashd773f53ca94acfb3df5cfa7ae87b0632608072ff | — | |
hash020086975001e27c95565f8040b7e637fbee03497b950f8c0cae4ed7a3d1074f | — | |
hash3137451920d1843a381904d3227caaffa9745a3eb99d40786524a2313589e9e0 | — | |
hashb5013ef4816a0aa0f82f1af06204c59b6cb7a491d44233f99b2545cd127d0a34 | — | |
hashc1243c763c8e20be71f380e5366060a73c4a80711d0d0018d4020b6051563101 | — |
Threat ID: 68c973c5ba2489d7522e0b2b
Added to database: 9/16/2025, 2:27:17 PM
Last enriched: 9/16/2025, 2:31:44 PM
Last updated: 11/1/2025, 6:57:34 AM
Views: 102
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
LotL Attack Hides Malware in Windows Native AI Stack
MediumPhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs
MediumNation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
MediumThreatFox IOCs for 2025-10-31
MediumRussia Arrests Meduza Stealer Developers After Government Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.