June 2025 Infostealer Trend Report
This analysis provides insights into Infostealer malware trends observed in June 2025. The data, collected through various automated systems, reveals changes in distribution methods and malware types. While LummaC2 has been dominant, June saw increased activity from Rhadamanthys, ACRStealer, Vidar, and StealC. A new variant of ACRStealer emerged, using advanced techniques like HTTP host domain spoofing and anti-analysis methods. Distribution via crack disguises decreased, with 94.4% in EXE format and 5.6% using DLL-SideLoading. A unique malware type was observed, creating an uncontrollable window prompting browser updates. Some samples now hide compression passwords in image files, indicating evolving evasion tactics.
AI Analysis
Technical Summary
The June 2025 Infostealer Trend Report highlights evolving trends in the deployment and sophistication of infostealer malware families. Infostealers are malicious programs designed to covertly extract sensitive information such as credentials, cookies, autofill data, and system details from infected hosts. The report identifies several prominent malware strains active in June 2025, including LummaC2, Rhadamanthys, ACRStealer, Vidar, and StealC. Notably, a new variant of ACRStealer has emerged, employing advanced evasion techniques such as HTTP host domain spoofing to masquerade network communications and anti-analysis methods to hinder detection and reverse engineering efforts. The distribution methods have shifted away from crack-based disguises, with 94.4% of samples delivered as standalone executable (EXE) files and 5.6% leveraging DLL side-loading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. A unique malware behavior was observed where an uncontrollable window prompts users to update their browsers, likely a social engineering tactic to induce user interaction or distract from malicious activity. Additionally, some malware samples now embed compression passwords within image files, an innovative evasion tactic to bypass static and heuristic detection by hiding payload decryption keys in innocuous-looking files. The malware families utilize a range of MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1055), discovery (T1082, T1087), command execution (T1059), and persistence mechanisms (T1547.001). Although no known exploits in the wild are reported, the evolving sophistication and distribution methods indicate a persistent threat landscape. The report underscores the importance of monitoring these malware families and adapting detection and mitigation strategies accordingly.
Potential Impact
For European organizations, the proliferation of these infostealer malware strains poses significant risks to confidentiality and integrity of sensitive data, including employee credentials, financial information, and intellectual property. The use of advanced evasion techniques complicates detection, increasing the likelihood of prolonged undetected breaches. Credential theft can lead to lateral movement within networks, enabling attackers to escalate privileges and access critical systems. The DLL side-loading technique and executable-based distribution increase the attack surface, potentially impacting a wide range of endpoints. The social engineering tactic of prompting browser updates may lead to user interaction that facilitates further compromise. Given Europe's stringent data protection regulations such as GDPR, breaches involving personal data can result in severe legal and financial penalties. Additionally, the theft of corporate secrets or disruption caused by malware can affect business continuity and reputation. The medium severity rating reflects the moderate ease of exploitation combined with potentially high impact on confidentiality and operational integrity if infections are successful.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to the evolving tactics observed in this campaign. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and process injection behaviors. 2) Monitor network traffic for anomalies such as HTTP host domain spoofing and unusual outbound connections to known C2 infrastructure associated with these malware families. 3) Implement strict application whitelisting to prevent execution of unauthorized EXE files and DLLs. 4) Conduct regular user awareness training focused on recognizing social engineering tactics, including fake browser update prompts. 5) Utilize threat intelligence feeds to update detection signatures with the provided malware hashes and indicators of compromise. 6) Enforce least privilege principles and multi-factor authentication to limit the impact of credential theft. 7) Scan and analyze image files and compressed archives for hidden payloads or embedded passwords using specialized forensic tools. 8) Maintain up-to-date patching of operating systems and applications to reduce exploitation vectors. 9) Employ behavioral analytics to detect suspicious process and file activities indicative of infostealer operations. 10) Establish incident response plans that include rapid containment and forensic analysis upon detection of these malware families.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Switzerland
Indicators of Compromise
- hash: 0b6eafed70b9b9f2ad5f8ef3047e0f91
- hash: 6ad298a767eee3b460bc9374bae33b99d6e7ecdc
- hash: 9868233efd40db7ca4ca8a74ba02b87ff7af25cc812a4656ffd36c50d4f9e919
- hash: 01542f203172d51d65bb37ce2cc2d813
- hash: 0896888ab8c9278da66138d2a0c5e713
- hash: 08a441a738a7a323abb97c576f619a22
- hash: 09825dd40ba8ba3c1ce240e844d650a8
- hash: 1d93a4ffc74db9be889ca2b9c66a9c4e31e80b12
- hash: 4799f47fac919b33ad235bddae6dd53bafac728f
- hash: c112707dc426200f5baea78d00137783a5dc3199
- hash: 1433f0f5590a42050ca6981ddac6a10fd407b212dae565454bcd083b9f19f1cc
- hash: a8f62dcf23a98fef9e2a58ab5d4354fa202be0acaa0a3e00942e89d49403a9af
- hash: d26eb35cee1df8774294ce519950fd7fe9b1122d23a6afd0626476c7453417fc
June 2025 Infostealer Trend Report
Description
This analysis provides insights into Infostealer malware trends observed in June 2025. The data, collected through various automated systems, reveals changes in distribution methods and malware types. While LummaC2 has been dominant, June saw increased activity from Rhadamanthys, ACRStealer, Vidar, and StealC. A new variant of ACRStealer emerged, using advanced techniques like HTTP host domain spoofing and anti-analysis methods. Distribution via crack disguises decreased, with 94.4% in EXE format and 5.6% using DLL-SideLoading. A unique malware type was observed, creating an uncontrollable window prompting browser updates. Some samples now hide compression passwords in image files, indicating evolving evasion tactics.
AI-Powered Analysis
Technical Analysis
The June 2025 Infostealer Trend Report highlights evolving trends in the deployment and sophistication of infostealer malware families. Infostealers are malicious programs designed to covertly extract sensitive information such as credentials, cookies, autofill data, and system details from infected hosts. The report identifies several prominent malware strains active in June 2025, including LummaC2, Rhadamanthys, ACRStealer, Vidar, and StealC. Notably, a new variant of ACRStealer has emerged, employing advanced evasion techniques such as HTTP host domain spoofing to masquerade network communications and anti-analysis methods to hinder detection and reverse engineering efforts. The distribution methods have shifted away from crack-based disguises, with 94.4% of samples delivered as standalone executable (EXE) files and 5.6% leveraging DLL side-loading, a technique where malicious DLLs are loaded by legitimate applications to evade detection. A unique malware behavior was observed where an uncontrollable window prompts users to update their browsers, likely a social engineering tactic to induce user interaction or distract from malicious activity. Additionally, some malware samples now embed compression passwords within image files, an innovative evasion tactic to bypass static and heuristic detection by hiding payload decryption keys in innocuous-looking files. The malware families utilize a range of MITRE ATT&CK techniques, including credential dumping (T1555), process injection (T1055), discovery (T1082, T1087), command execution (T1059), and persistence mechanisms (T1547.001). Although no known exploits in the wild are reported, the evolving sophistication and distribution methods indicate a persistent threat landscape. The report underscores the importance of monitoring these malware families and adapting detection and mitigation strategies accordingly.
Potential Impact
For European organizations, the proliferation of these infostealer malware strains poses significant risks to confidentiality and integrity of sensitive data, including employee credentials, financial information, and intellectual property. The use of advanced evasion techniques complicates detection, increasing the likelihood of prolonged undetected breaches. Credential theft can lead to lateral movement within networks, enabling attackers to escalate privileges and access critical systems. The DLL side-loading technique and executable-based distribution increase the attack surface, potentially impacting a wide range of endpoints. The social engineering tactic of prompting browser updates may lead to user interaction that facilitates further compromise. Given Europe's stringent data protection regulations such as GDPR, breaches involving personal data can result in severe legal and financial penalties. Additionally, the theft of corporate secrets or disruption caused by malware can affect business continuity and reputation. The medium severity rating reflects the moderate ease of exploitation combined with potentially high impact on confidentiality and operational integrity if infections are successful.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to the evolving tactics observed in this campaign. Specific recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL side-loading and process injection behaviors. 2) Monitor network traffic for anomalies such as HTTP host domain spoofing and unusual outbound connections to known C2 infrastructure associated with these malware families. 3) Implement strict application whitelisting to prevent execution of unauthorized EXE files and DLLs. 4) Conduct regular user awareness training focused on recognizing social engineering tactics, including fake browser update prompts. 5) Utilize threat intelligence feeds to update detection signatures with the provided malware hashes and indicators of compromise. 6) Enforce least privilege principles and multi-factor authentication to limit the impact of credential theft. 7) Scan and analyze image files and compressed archives for hidden payloads or embedded passwords using specialized forensic tools. 8) Maintain up-to-date patching of operating systems and applications to reduce exploitation vectors. 9) Employ behavioral analytics to detect suspicious process and file activities indicative of infostealer operations. 10) Establish incident response plans that include rapid containment and forensic analysis upon detection of these malware families.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/89033"]
- Adversary
- null
- Pulse Id
- 6877cee76da84ce9db22b91e
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0b6eafed70b9b9f2ad5f8ef3047e0f91 | — | |
hash6ad298a767eee3b460bc9374bae33b99d6e7ecdc | — | |
hash9868233efd40db7ca4ca8a74ba02b87ff7af25cc812a4656ffd36c50d4f9e919 | — | |
hash01542f203172d51d65bb37ce2cc2d813 | — | |
hash0896888ab8c9278da66138d2a0c5e713 | — | |
hash08a441a738a7a323abb97c576f619a22 | — | |
hash09825dd40ba8ba3c1ce240e844d650a8 | — | |
hash1d93a4ffc74db9be889ca2b9c66a9c4e31e80b12 | — | |
hash4799f47fac919b33ad235bddae6dd53bafac728f | — | |
hashc112707dc426200f5baea78d00137783a5dc3199 | — | |
hash1433f0f5590a42050ca6981ddac6a10fd407b212dae565454bcd083b9f19f1cc | — | |
hasha8f62dcf23a98fef9e2a58ab5d4354fa202be0acaa0a3e00942e89d49403a9af | — | |
hashd26eb35cee1df8774294ce519950fd7fe9b1122d23a6afd0626476c7453417fc | — |
Threat ID: 68780518a83201eaacde1699
Added to database: 7/16/2025, 8:01:28 PM
Last enriched: 7/16/2025, 8:17:08 PM
Last updated: 7/17/2025, 12:38:45 PM
Views: 6
Related Threats
GitHub Abused to Spread Amadey, Lumma and Redline InfoStealers in Ukraine
MediumInfrastructure of Interest: Suspicious Domains
MediumJune 2025 APT Attack Trends Report (South Korea)
MediumJune 2025 Threat Trend Report on Ransomware
MediumThe Solidity Language open-source package was used in a $500,000 crypto heist
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.