"Adoro l'odore degli #screenshot rubati dagli #infostealer al mattino" cit.

@sicurezza

Arkanix Stealer pops up as short-lived AI info-stealer experiment

An information-stealing malware operation named Arkanix Stealer, promoted on multiple dark web forums towards the end of 2025, was likely developed as an AI-assisted experiment.

BleepingComputer

Hello everyone! It's been a slightly quieter 24 hours in the cyber world, but we still have some interesting developments to cover, including a peek into AI-assisted malware development and a significant data privacy gaffe. Let's dive in:

AI-Assisted Info-Stealer Experiment: Arkanix Stealer 🤖

- A new information-stealing malware, Arkanix Stealer, was promoted on dark web forums for a brief period in late 2025 before its author abruptly took it down.
- Kaspersky researchers found strong indicators of Large Language Model (LLM) involvement in its development, suggesting an experiment to rapidly build and deploy malware, potentially reducing development time and costs.
- Arkanix offered extensive data-stealing capabilities, targeting browser data, cryptocurrency wallets, VPN credentials, and gaming platforms, with a premium C++ version adding advanced features like the ChromElevator post-exploitation tool.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment/

Cornwall Council's Data Breach Blunder ⚠️

- Cornwall Council in the UK is facing a data breach claim after allegedly exposing the personal details of ten complainants to the subject of their complaints, Cllr Dulcie Tudor.
- Despite four individuals requesting redaction, the council's process failed, with Cllr Tudor gaining access to names, home addresses, email addresses, and phone numbers simply by opening the attached complaint files.
- This incident highlights critical flaws in the council's data handling procedures and raises concerns about compliance with data protection regulations, prompting an immediate review of how sensitive information is processed and shared.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/22/cornwall_council_complaints_breach/

#CyberSecurity #ThreatIntelligence #Malware #InfoStealer #AI #LLM #DataPrivacy #DataBreach #GDPR #InfoSec #CyberNews

Arkanix Stealer pops up as short-lived AI info-stealer experiment

An information-stealing malware operation named Arkanix Stealer, promoted on multiple dark web forums towards the end of 2025, was likely developed as an AI-assisted experiment.

BleepingComputer

Arkanix Stealer Targets Browsers via Dual Implementation

Arkanix Stealer is a MaaS infostealer with both C++ and Python implementations.

Pulse ID: 699b559757b9fda783b4d450
Pulse Link: https://otx.alienvault.com/pulse/699b559757b9fda783b4d450
Pulse Author: cryptocti
Created: 2026-02-22 19:14:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #MaaS #OTX #OpenThreatExchange #Python #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

CharlieKirk Credential Theft Malware Targeting Windows

CharlieKirk Grabber is a Python-based Windows infostealer that rapidly steals browser credentials

Pulse ID: 699a25c4c3fd0bde93c72263
Pulse Link: https://otx.alienvault.com/pulse/699a25c4c3fd0bde93c72263
Pulse Author: cryptocti
Created: 2026-02-21 21:38:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #Malware #OTX #OpenThreatExchange #Python #Windows #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

📢⚠️ New ClickFix attack uses fake CAPTCHA pages to trick users into running PowerShell malware. The infostealer targets crypto wallets, 25+ browsers, gaming accounts, and VPN data.

Read: https://hackread.com/clickfix-attack-crypto-wallets-browsers-infostealer/

#CyberSecurity #Malware #Infostealer #ClickFix #Captcha

New ClickFix Attack Targets Crypto Wallets and 25+ Browsers with Infostealer

Fake CAPTCHA campaign tied to ClickFix spreads infostealer targeting 25+ browsers, crypto wallets and gaming accounts via malicious PowerShell commands.

Hackread - Cybersecurity News, Data Breaches, AI and More

OpenClaw nel mirino: infostealer intercetta dati sensibili
Sono stati segnalati diversi attacchi informatici che sfruttano OpenClaw per rubare dati dai computer degli utenti. Gli esperti di Hudson Rock hanno individuato un nuovo infostealer che può rubare informazioni sensibili direttamente dai file di configurazione del popolare agente AI open source.

@opensource #infostealer #openclaw

#AttacchiInformatici #opensource

#sicurezzainformatica #intelligenzaartificiale

https://www.punto-informatico.it/openclaw-mirino-infostealer-intercetta-dati-sensibili/

OpenClaw nel mirino: infostealer intercetta dati sensibili

Esperti di sicurezza hanno rilevato un infostealer che può rubare dati sensibili dai file di configurazione di OpenClaw, popolare agente AI open source.

Punto Informatico

Fake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis

A sophisticated malware campaign targeting macOS users has been discovered, utilizing typosquatted domains impersonating the Homebrew package manager. The attack, dubbed ClickFix, exploits users' trust in command-line installation processes. Victims are tricked into executing malicious curl commands, leading to the deployment of a credential harvester and the Cuckoo Stealer malware. This infostealer establishes persistence through LaunchAgents, bypasses Gatekeeper, and employs encrypted C2 communication. It systematically exfiltrates sensitive data including browser credentials, cryptocurrency wallets, and system information. The campaign's infrastructure spans multiple domains hosted on shared IP addresses, indicating a coordinated and evolving threat.

Pulse ID: 69972ba35a28ae9de06a7308
Pulse Link: https://otx.alienvault.com/pulse/69972ba35a28ae9de06a7308
Pulse Author: AlienVault
Created: 2026-02-19 15:26:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #CyberSecurity #InfoSec #InfoStealer #Mac #MacOS #Malware #OTX #OpenThreatExchange #RAT #Rust #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Arkanix Stealer: a C++ & Python infostealer

A C++ and Python infostealer, dubbed Arkanix, has been developed and used by Kaspersky, a leading security firm, to spread and steal data from organisations across the globe.

Pulse ID: 6996f650827c9b89d94e32af
Pulse Link: https://otx.alienvault.com/pulse/6996f650827c9b89d94e32af
Pulse Author: CyberHunter_NL
Created: 2026-02-19 11:38:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #InfoStealer #Kaspersky #OTX #OpenThreatExchange #Python #bot #CyberHunter_NL

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange