Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
Proofpoint researchers have observed an increase in cybercriminals using Stealerium-based malware, an open-source infostealer available on GitHub. Multiple stealers share code with Stealerium, including Phantom Stealer. Campaigns delivering Stealerium have used various lures and file types, targeting industries like hospitality, education, and finance. The malware can exfiltrate a wide range of data, including browser credentials, credit card info, and crypto wallet data. It uses anti-analysis techniques and can exfiltrate data through multiple channels like SMTP, Discord, and Telegram. The rise in Stealerium usage reflects the growing trend of threat actors pivoting to information stealers as identity theft becomes a priority.
AI Analysis
Technical Summary
Stealerium and Phantom Stealer represent a class of open-source infostealer malware that has been increasingly observed in cybercriminal operations. Stealerium, available on GitHub, serves as a base code for multiple infostealers including Phantom Stealer, indicating code reuse and modular development within threat actor communities. These malware families are designed to exfiltrate sensitive user information such as browser credentials, credit card details, and cryptocurrency wallet data. The campaigns leveraging Stealerium employ diverse social engineering lures and file types to target sectors including hospitality, education, and finance, which are known for handling valuable personal and financial data. Technically, these stealers incorporate anti-analysis techniques to evade detection and forensic examination, complicating incident response efforts. Data exfiltration is conducted through multiple channels, notably SMTP email, Discord, and Telegram, which allows flexible and covert communication with command and control infrastructure. The malware also integrates keylogging capabilities (e.g., Snake keylogger) and uses various MITRE ATT&CK techniques such as credential dumping (T1555), process discovery (T1057), and obfuscated files or information (T1027). The rise in Stealerium usage reflects a broader trend where cybercriminals prioritize identity theft and data theft, leveraging open-source tools to lower the barrier for attack deployment. Although no known exploits in the wild have been reported, the availability of source code and active campaigns suggest a persistent and evolving threat landscape.
Potential Impact
For European organizations, the impact of Stealerium and Phantom Stealer is significant due to the sensitive nature of the targeted data and the sectors affected. Hospitality, education, and finance industries in Europe handle large volumes of personal data protected under GDPR, meaning breaches can lead to severe regulatory penalties and reputational damage. The theft of browser credentials and crypto wallet information can facilitate further fraud, unauthorized financial transactions, and identity theft, potentially affecting both individuals and enterprises. The use of multiple exfiltration channels complicates detection and containment, increasing the risk of prolonged data exposure. Additionally, the anti-analysis features hinder timely incident response and forensic investigations, potentially allowing attackers to maintain persistence and expand their foothold. Given Europe's strong regulatory environment and the high value of personal and financial data, organizations face both direct operational risks and indirect legal and compliance consequences. The targeting of education and hospitality sectors also raises concerns about the protection of vulnerable user populations and transient customer data, respectively.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting infostealer behaviors such as credential dumping, keylogging, and unusual outbound connections to SMTP, Discord, and Telegram domains. 2) Monitor network traffic for anomalous use of non-standard exfiltration channels, especially encrypted or obfuscated communications to known malicious domains like phantomsoftwares.site. 3) Harden email and web gateways to filter and block phishing lures and malicious attachments commonly used to deliver Stealerium payloads. 4) Enforce strict application whitelisting and restrict execution of unauthorized scripts or binaries, particularly those downloaded from untrusted sources or GitHub repositories. 5) Conduct regular credential hygiene practices including multi-factor authentication (MFA) enforcement, password rotation, and monitoring for credential reuse or compromise. 6) Implement user awareness training focused on recognizing social engineering tactics used in these campaigns. 7) Utilize threat intelligence feeds to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains. 8) Establish incident response playbooks that include rapid forensic analysis to counter anti-analysis techniques and contain breaches swiftly. 9) Segment networks to limit lateral movement and data access in case of infection. 10) Regularly audit and patch systems to reduce attack surface, even though no specific vulnerabilities are exploited, to prevent secondary infection vectors.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
Indicators of Compromise
- hash: 024c6a6cd262b13e1f0438bf89cf84d8
- hash: 86e5e63b28b53133e59e17cecc27b011
- hash: c742f9b4f1ad3336673662d7213a56ca
- hash: 928623d974b49d989c30b968d8925172f18bed7b
- hash: e9fdc0060a78608b6768675f6473321f07350ee3
- hash: 41700c8fe273e088932cc57d15ee86c281fd8d2e771f4e4bf77b0e2c387b8b23
- hash: 50927b350c108e730dc4098bbda4d9d8e7c7833f43ab9704f819e631b1d981e3
- hash: a00fda931ab1a591a73d1a24c1b270aee0f31d6e415dfa9ae2d0f126326df4bb
- hash: b640251f82684d3b454a29e962c0762a38d8ac91574ae4866fe2736f9ddd676e
- hash: d4a33be36cd0905651ce69586542ae9bb5763feddc9d1af98e90ff86a6914c0e
- hash: e590552eea3ad225cfb6a33fd9a71f12f1861c8332a6f3a8e2050fffce93f45e
- url: https://phantomsoftwares.site/home/.
- domain: phantomsoftwares.site
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
Description
Proofpoint researchers have observed an increase in cybercriminals using Stealerium-based malware, an open-source infostealer available on GitHub. Multiple stealers share code with Stealerium, including Phantom Stealer. Campaigns delivering Stealerium have used various lures and file types, targeting industries like hospitality, education, and finance. The malware can exfiltrate a wide range of data, including browser credentials, credit card info, and crypto wallet data. It uses anti-analysis techniques and can exfiltrate data through multiple channels like SMTP, Discord, and Telegram. The rise in Stealerium usage reflects the growing trend of threat actors pivoting to information stealers as identity theft becomes a priority.
AI-Powered Analysis
Technical Analysis
Stealerium and Phantom Stealer represent a class of open-source infostealer malware that has been increasingly observed in cybercriminal operations. Stealerium, available on GitHub, serves as a base code for multiple infostealers including Phantom Stealer, indicating code reuse and modular development within threat actor communities. These malware families are designed to exfiltrate sensitive user information such as browser credentials, credit card details, and cryptocurrency wallet data. The campaigns leveraging Stealerium employ diverse social engineering lures and file types to target sectors including hospitality, education, and finance, which are known for handling valuable personal and financial data. Technically, these stealers incorporate anti-analysis techniques to evade detection and forensic examination, complicating incident response efforts. Data exfiltration is conducted through multiple channels, notably SMTP email, Discord, and Telegram, which allows flexible and covert communication with command and control infrastructure. The malware also integrates keylogging capabilities (e.g., Snake keylogger) and uses various MITRE ATT&CK techniques such as credential dumping (T1555), process discovery (T1057), and obfuscated files or information (T1027). The rise in Stealerium usage reflects a broader trend where cybercriminals prioritize identity theft and data theft, leveraging open-source tools to lower the barrier for attack deployment. Although no known exploits in the wild have been reported, the availability of source code and active campaigns suggest a persistent and evolving threat landscape.
Potential Impact
For European organizations, the impact of Stealerium and Phantom Stealer is significant due to the sensitive nature of the targeted data and the sectors affected. Hospitality, education, and finance industries in Europe handle large volumes of personal data protected under GDPR, meaning breaches can lead to severe regulatory penalties and reputational damage. The theft of browser credentials and crypto wallet information can facilitate further fraud, unauthorized financial transactions, and identity theft, potentially affecting both individuals and enterprises. The use of multiple exfiltration channels complicates detection and containment, increasing the risk of prolonged data exposure. Additionally, the anti-analysis features hinder timely incident response and forensic investigations, potentially allowing attackers to maintain persistence and expand their foothold. Given Europe's strong regulatory environment and the high value of personal and financial data, organizations face both direct operational risks and indirect legal and compliance consequences. The targeting of education and hospitality sectors also raises concerns about the protection of vulnerable user populations and transient customer data, respectively.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting infostealer behaviors such as credential dumping, keylogging, and unusual outbound connections to SMTP, Discord, and Telegram domains. 2) Monitor network traffic for anomalous use of non-standard exfiltration channels, especially encrypted or obfuscated communications to known malicious domains like phantomsoftwares.site. 3) Harden email and web gateways to filter and block phishing lures and malicious attachments commonly used to deliver Stealerium payloads. 4) Enforce strict application whitelisting and restrict execution of unauthorized scripts or binaries, particularly those downloaded from untrusted sources or GitHub repositories. 5) Conduct regular credential hygiene practices including multi-factor authentication (MFA) enforcement, password rotation, and monitoring for credential reuse or compromise. 6) Implement user awareness training focused on recognizing social engineering tactics used in these campaigns. 7) Utilize threat intelligence feeds to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains. 8) Establish incident response playbooks that include rapid forensic analysis to counter anti-analysis techniques and contain breaches swiftly. 9) Segment networks to limit lateral movement and data access in case of infection. 10) Regularly audit and patch systems to reduce attack surface, even though no specific vulnerabilities are exploited, to prevent secondary infection vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/not-safe-work-tracking-and-investigating-stealerium-and-phantom-infostealers"]
- Adversary
- TA2715
- Pulse Id
- 68b8e464780a54c10f7adc54
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash024c6a6cd262b13e1f0438bf89cf84d8 | — | |
hash86e5e63b28b53133e59e17cecc27b011 | — | |
hashc742f9b4f1ad3336673662d7213a56ca | — | |
hash928623d974b49d989c30b968d8925172f18bed7b | — | |
hashe9fdc0060a78608b6768675f6473321f07350ee3 | — | |
hash41700c8fe273e088932cc57d15ee86c281fd8d2e771f4e4bf77b0e2c387b8b23 | — | |
hash50927b350c108e730dc4098bbda4d9d8e7c7833f43ab9704f819e631b1d981e3 | — | |
hasha00fda931ab1a591a73d1a24c1b270aee0f31d6e415dfa9ae2d0f126326df4bb | — | |
hashb640251f82684d3b454a29e962c0762a38d8ac91574ae4866fe2736f9ddd676e | — | |
hashd4a33be36cd0905651ce69586542ae9bb5763feddc9d1af98e90ff86a6914c0e | — | |
hashe590552eea3ad225cfb6a33fd9a71f12f1861c8332a6f3a8e2050fffce93f45e | — |
Url
Value | Description | Copy |
---|---|---|
urlhttps://phantomsoftwares.site/home/. | — |
Domain
Value | Description | Copy |
---|---|---|
domainphantomsoftwares.site | — |
Threat ID: 68b966f223d09a442447948f
Added to database: 9/4/2025, 10:16:18 AM
Last enriched: 9/4/2025, 10:19:36 AM
Last updated: 9/4/2025, 5:58:44 PM
Views: 4
Related Threats
Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more
MediumNew Malware Uses Windows Character Map for Cryptomining
MediumEthereum smart contracts used to push malicious code on npm
MediumThreatFox IOCs for 2025-09-03
MediumGoogle Salesforce Breach: A Deep dive into the chain and extent of the compromise
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.