Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
Proofpoint researchers have observed an increase in cybercriminals using Stealerium-based malware, an open-source infostealer available on GitHub. Multiple stealers share code with Stealerium, including Phantom Stealer. Campaigns delivering Stealerium have used various lures and file types, targeting industries like hospitality, education, and finance. The malware can exfiltrate a wide range of data, including browser credentials, credit card info, and crypto wallet data. It uses anti-analysis techniques and can exfiltrate data through multiple channels like SMTP, Discord, and Telegram. The rise in Stealerium usage reflects the growing trend of threat actors pivoting to information stealers as identity theft becomes a priority.
AI Analysis
Technical Summary
Stealerium and Phantom Stealer represent a class of open-source infostealer malware that has been increasingly observed in cybercriminal operations. Stealerium, available on GitHub, serves as a base code for multiple infostealers including Phantom Stealer, indicating code reuse and modular development within threat actor communities. These malware families are designed to exfiltrate sensitive user information such as browser credentials, credit card details, and cryptocurrency wallet data. The campaigns leveraging Stealerium employ diverse social engineering lures and file types to target sectors including hospitality, education, and finance, which are known for handling valuable personal and financial data. Technically, these stealers incorporate anti-analysis techniques to evade detection and forensic examination, complicating incident response efforts. Data exfiltration is conducted through multiple channels, notably SMTP email, Discord, and Telegram, which allows flexible and covert communication with command and control infrastructure. The malware also integrates keylogging capabilities (e.g., Snake keylogger) and uses various MITRE ATT&CK techniques such as credential dumping (T1555), process discovery (T1057), and obfuscated files or information (T1027). The rise in Stealerium usage reflects a broader trend where cybercriminals prioritize identity theft and data theft, leveraging open-source tools to lower the barrier for attack deployment. Although no known exploits in the wild have been reported, the availability of source code and active campaigns suggest a persistent and evolving threat landscape.
Potential Impact
For European organizations, the impact of Stealerium and Phantom Stealer is significant due to the sensitive nature of the targeted data and the sectors affected. Hospitality, education, and finance industries in Europe handle large volumes of personal data protected under GDPR, meaning breaches can lead to severe regulatory penalties and reputational damage. The theft of browser credentials and crypto wallet information can facilitate further fraud, unauthorized financial transactions, and identity theft, potentially affecting both individuals and enterprises. The use of multiple exfiltration channels complicates detection and containment, increasing the risk of prolonged data exposure. Additionally, the anti-analysis features hinder timely incident response and forensic investigations, potentially allowing attackers to maintain persistence and expand their foothold. Given Europe's strong regulatory environment and the high value of personal and financial data, organizations face both direct operational risks and indirect legal and compliance consequences. The targeting of education and hospitality sectors also raises concerns about the protection of vulnerable user populations and transient customer data, respectively.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting infostealer behaviors such as credential dumping, keylogging, and unusual outbound connections to SMTP, Discord, and Telegram domains. 2) Monitor network traffic for anomalous use of non-standard exfiltration channels, especially encrypted or obfuscated communications to known malicious domains like phantomsoftwares.site. 3) Harden email and web gateways to filter and block phishing lures and malicious attachments commonly used to deliver Stealerium payloads. 4) Enforce strict application whitelisting and restrict execution of unauthorized scripts or binaries, particularly those downloaded from untrusted sources or GitHub repositories. 5) Conduct regular credential hygiene practices including multi-factor authentication (MFA) enforcement, password rotation, and monitoring for credential reuse or compromise. 6) Implement user awareness training focused on recognizing social engineering tactics used in these campaigns. 7) Utilize threat intelligence feeds to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains. 8) Establish incident response playbooks that include rapid forensic analysis to counter anti-analysis techniques and contain breaches swiftly. 9) Segment networks to limit lateral movement and data access in case of infection. 10) Regularly audit and patch systems to reduce attack surface, even though no specific vulnerabilities are exploited, to prevent secondary infection vectors.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Ireland
Indicators of Compromise
- hash: 024c6a6cd262b13e1f0438bf89cf84d8
- hash: 86e5e63b28b53133e59e17cecc27b011
- hash: c742f9b4f1ad3336673662d7213a56ca
- hash: 928623d974b49d989c30b968d8925172f18bed7b
- hash: e9fdc0060a78608b6768675f6473321f07350ee3
- hash: 41700c8fe273e088932cc57d15ee86c281fd8d2e771f4e4bf77b0e2c387b8b23
- hash: 50927b350c108e730dc4098bbda4d9d8e7c7833f43ab9704f819e631b1d981e3
- hash: a00fda931ab1a591a73d1a24c1b270aee0f31d6e415dfa9ae2d0f126326df4bb
- hash: b640251f82684d3b454a29e962c0762a38d8ac91574ae4866fe2736f9ddd676e
- hash: d4a33be36cd0905651ce69586542ae9bb5763feddc9d1af98e90ff86a6914c0e
- hash: e590552eea3ad225cfb6a33fd9a71f12f1861c8332a6f3a8e2050fffce93f45e
- url: https://phantomsoftwares.site/home/.
- domain: phantomsoftwares.site
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
Description
Proofpoint researchers have observed an increase in cybercriminals using Stealerium-based malware, an open-source infostealer available on GitHub. Multiple stealers share code with Stealerium, including Phantom Stealer. Campaigns delivering Stealerium have used various lures and file types, targeting industries like hospitality, education, and finance. The malware can exfiltrate a wide range of data, including browser credentials, credit card info, and crypto wallet data. It uses anti-analysis techniques and can exfiltrate data through multiple channels like SMTP, Discord, and Telegram. The rise in Stealerium usage reflects the growing trend of threat actors pivoting to information stealers as identity theft becomes a priority.
AI-Powered Analysis
Technical Analysis
Stealerium and Phantom Stealer represent a class of open-source infostealer malware that has been increasingly observed in cybercriminal operations. Stealerium, available on GitHub, serves as a base code for multiple infostealers including Phantom Stealer, indicating code reuse and modular development within threat actor communities. These malware families are designed to exfiltrate sensitive user information such as browser credentials, credit card details, and cryptocurrency wallet data. The campaigns leveraging Stealerium employ diverse social engineering lures and file types to target sectors including hospitality, education, and finance, which are known for handling valuable personal and financial data. Technically, these stealers incorporate anti-analysis techniques to evade detection and forensic examination, complicating incident response efforts. Data exfiltration is conducted through multiple channels, notably SMTP email, Discord, and Telegram, which allows flexible and covert communication with command and control infrastructure. The malware also integrates keylogging capabilities (e.g., Snake keylogger) and uses various MITRE ATT&CK techniques such as credential dumping (T1555), process discovery (T1057), and obfuscated files or information (T1027). The rise in Stealerium usage reflects a broader trend where cybercriminals prioritize identity theft and data theft, leveraging open-source tools to lower the barrier for attack deployment. Although no known exploits in the wild have been reported, the availability of source code and active campaigns suggest a persistent and evolving threat landscape.
Potential Impact
For European organizations, the impact of Stealerium and Phantom Stealer is significant due to the sensitive nature of the targeted data and the sectors affected. Hospitality, education, and finance industries in Europe handle large volumes of personal data protected under GDPR, meaning breaches can lead to severe regulatory penalties and reputational damage. The theft of browser credentials and crypto wallet information can facilitate further fraud, unauthorized financial transactions, and identity theft, potentially affecting both individuals and enterprises. The use of multiple exfiltration channels complicates detection and containment, increasing the risk of prolonged data exposure. Additionally, the anti-analysis features hinder timely incident response and forensic investigations, potentially allowing attackers to maintain persistence and expand their foothold. Given Europe's strong regulatory environment and the high value of personal and financial data, organizations face both direct operational risks and indirect legal and compliance consequences. The targeting of education and hospitality sectors also raises concerns about the protection of vulnerable user populations and transient customer data, respectively.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting infostealer behaviors such as credential dumping, keylogging, and unusual outbound connections to SMTP, Discord, and Telegram domains. 2) Monitor network traffic for anomalous use of non-standard exfiltration channels, especially encrypted or obfuscated communications to known malicious domains like phantomsoftwares.site. 3) Harden email and web gateways to filter and block phishing lures and malicious attachments commonly used to deliver Stealerium payloads. 4) Enforce strict application whitelisting and restrict execution of unauthorized scripts or binaries, particularly those downloaded from untrusted sources or GitHub repositories. 5) Conduct regular credential hygiene practices including multi-factor authentication (MFA) enforcement, password rotation, and monitoring for credential reuse or compromise. 6) Implement user awareness training focused on recognizing social engineering tactics used in these campaigns. 7) Utilize threat intelligence feeds to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains. 8) Establish incident response playbooks that include rapid forensic analysis to counter anti-analysis techniques and contain breaches swiftly. 9) Segment networks to limit lateral movement and data access in case of infection. 10) Regularly audit and patch systems to reduce attack surface, even though no specific vulnerabilities are exploited, to prevent secondary infection vectors.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.proofpoint.com/us/blog/threat-insight/not-safe-work-tracking-and-investigating-stealerium-and-phantom-infostealers"]
- Adversary
- TA2715
- Pulse Id
- 68b8e464780a54c10f7adc54
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash024c6a6cd262b13e1f0438bf89cf84d8 | — | |
hash86e5e63b28b53133e59e17cecc27b011 | — | |
hashc742f9b4f1ad3336673662d7213a56ca | — | |
hash928623d974b49d989c30b968d8925172f18bed7b | — | |
hashe9fdc0060a78608b6768675f6473321f07350ee3 | — | |
hash41700c8fe273e088932cc57d15ee86c281fd8d2e771f4e4bf77b0e2c387b8b23 | — | |
hash50927b350c108e730dc4098bbda4d9d8e7c7833f43ab9704f819e631b1d981e3 | — | |
hasha00fda931ab1a591a73d1a24c1b270aee0f31d6e415dfa9ae2d0f126326df4bb | — | |
hashb640251f82684d3b454a29e962c0762a38d8ac91574ae4866fe2736f9ddd676e | — | |
hashd4a33be36cd0905651ce69586542ae9bb5763feddc9d1af98e90ff86a6914c0e | — | |
hashe590552eea3ad225cfb6a33fd9a71f12f1861c8332a6f3a8e2050fffce93f45e | — |
Url
Value | Description | Copy |
---|---|---|
urlhttps://phantomsoftwares.site/home/. | — |
Domain
Value | Description | Copy |
---|---|---|
domainphantomsoftwares.site | — |
Threat ID: 68b966f223d09a442447948f
Added to database: 9/4/2025, 10:16:18 AM
Last enriched: 9/4/2025, 10:19:36 AM
Last updated: 10/20/2025, 12:47:13 AM
Views: 139
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-10-19
MediumNorth Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
MediumSilver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
MediumThreatFox IOCs for 2025-10-18
MediumWinos 4.0 hackers expand to Japan and Malaysia with new malware
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.