Malware control panels could give experts the tools they need to spy on hackers

  • CyberArk exploited StealC’s control panel via source leak and XSS flaw
  • Researchers exposed attacker “YouTubeTA,” who stole 390,000 passwords and 30M cookies
  • Findings may disrupt StealC operations by attracting further scrutiny and attacks

Cybersecurity researchers have managed to break into the web-based control panel for the StealC infostealer and gain valuable information on how the malware operates, and who both the attackers and the victims are.

StealC is an immensely popular infostealer malware which first emerged a couple of years ago, and has since become one of the staples of the cybercriminal community.

It can collect and exfiltrate sensitive data such as web browser credentials, cookies, system information, messaging app and email data, as well as cryptocurrency wallet details, and it offers different features such as modular targeting, stealthy execution, and flexible command-and-control communications.

Doxxing victims

Security researchers from CyberArk found two ways to access the control panel; through a source code leak that happened around April 2025, and through a cross-site scripting (XSS) vulnerability they discovered.

“By exploiting the vulnerability, we were able to identify characteristics of the threat actor’s computers, including general location indicators and computer hardware details,” the researchers said. “Additionally, we were able to retrieve active session cookies, which allowed us to gain control of sessions from our own machines.”

The report details one threat actor, dubbed “YouTubeTA”, who used stolen credentials to log into legitimate YouTube channels and plant links for the malware. The campaign brought YouTubeTA more than 5,000 victim logs, 390,000 passwords, and 30 million cookies.

CyberArk discovered that the attacker used an Apple M3-based device, with English and Russian language settings. The time zone was set to Eastern Europe, and on at least one occasion, they logged in from Ukraine. Usually, cybercriminals would only log in through a VPN to cover their tracks, but this threat actor forgot to do that once, revealing their IP address, which is linked to the Ukrainian ISP TRK Cable TV.

By releasing this news, CyberArk hopes StealC will also be targeted by other players, both benign and malicious, thus disrupting the entire operation.

Via BleepingComputer

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Read more @ TechRadar

Latest posts

Digg’s open beta shuts down after just two months, blaming AI bot spam

It's only been a year since Digg founder Kevin Rose, Reddit cofounder Alexis Ohanian, and a few others announced the link-sharing site would relaunch,...

Trump Mobile is just one in the crowd of conservative carriers

Where's the Trump phone? We're going to keep talking about it every week. This week, I wanted to see how Trump Mobile stacks up...

Microsoft’s Copilot AI assistant is coming to current-gen Xbox consoles this year

Xbox is getting ready to launch its Gaming Copilot AI assistant on "current-generation consoles" this year, according to a report from GamesRadar. Sonali Yadav,...

Spotify tests letting users directly customize their Taste Profile

Less slop please. | Image: Spotify Spotify Premium users in New Zealand will be the first to experience the service's latest personalization feature. The company...

States’ anti-monopoly case against Live Nation continues Monday

The Live Nation-Ticketmaster trial is back on. Dozens of states are expected to move forward with their claims against the company's alleged concert industry...

The MacBook Neo is Apple’s most repairable laptop

Apple's cheapest laptop is also its most repairable. iFixit gave the new MacBook Neo a 6/10 repairability score. Although that number would only be...

Nothing updates its AI app with semantic search and a new way to track events

In the mad dash many companies have made to incorporate AI features into their phones, Nothing arrived at one of the better ideas with...

Adobe agrees to pay settlement for making its subscriptions hard to cancel

Adobe has agreed to pay the US government $75 million to settle its lawsuit over the company's allegedly harmful approach to subscriptions. The suit...