<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Infostealer — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/infostealer/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 13:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/infostealer/feed.xml" rel="self" type="application/rss+xml"/><item><title>ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer</title><link>https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</link><pubDate>Thu, 30 Apr 2026 13:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-clickfix-backgroundfix/</guid><description>The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.</description><content:encoded><![CDATA[<p>The BackgroundFix campaign is a social engineering scheme using fake &ldquo;remove your photo background&rdquo; services to deliver malware. Victims are lured to malicious sites mimicking legitimate image editing tools. The sites feature fake upload interfaces, progress bars, and download buttons to appear authentic. This campaign delivers a multi-stage payload, starting with CastleLoader. CastleLoader then drops NetSupport RAT, enabling remote access for the attackers, and CastleStealer, a custom .NET stealer designed to exfiltrate browser credentials, wallet extension data, and Telegram session files. This campaign appears to be active, with multiple domains sharing the same template.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Victim searches for an online background removal tool and lands on a malicious BackgroundFix site.</li>
<li>The victim uploads an image to the fake website.</li>
<li>After clicking a checkbox, the site instructs the victim to copy a command to their clipboard.</li>
<li>The copied command executes <code>finger.exe</code> to query <code>cheeshomireciple[.]com</code></li>
<li><code>finger.exe</code> retrieves a batch script from the C2 server.</li>
<li>The batch script executes commands to download and execute further payloads.</li>
<li>CastleLoader is deployed, subsequently dropping NetSupport RAT and CastleStealer.</li>
<li>NetSupport RAT grants the attacker remote access, while CastleStealer exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks result in the installation of NetSupport RAT, granting attackers remote control over the compromised system. Additionally, CastleStealer exfiltrates sensitive information such as browser credentials, wallet extension data, and Telegram session files. This stolen data can be used for further malicious activities, including financial fraud, identity theft, and unauthorized access to sensitive accounts. The active nature of the campaign and the use of multiple domains suggest a broad targeting scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>finger.exe</code> with command-line arguments pointing to external domains (IOC: <code>cheeshomireciple[.]com</code>).</li>
<li>Deploy the Sigma rule to detect the execution of <code>finger.exe</code> to identify potential initial access attempts.</li>
<li>Block the C2 domain <code>cheeshomireciple[.]com</code> at the DNS resolver to prevent initial payload delivery.</li>
<li>Monitor network connections for NetSupport RAT C2 communications on port 688 to detect compromised systems (IOCs: <code>poronto[.]com:688</code>, <code>giovettiadv[.]com:688</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>clickfix</category><category>malware</category><category>social-engineering</category><category>rat</category><category>infostealer</category><category>castleloader</category><category>netsupport</category></item><item><title>TeamPCP Supply Chain Attack via CI/CD Compromise</title><link>https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-teampcp-supply-chain/</guid><description>TeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.</description><content:encoded><![CDATA[<p>TeamPCP is conducting a supply chain attack targeting multiple companies through the compromise of their CI/CD pipelines and GitHub accounts. The attack involves an infostealer designed to harvest sensitive information such as credentials from CI environments, contents of .env files, and cloud tokens. The compromised credentials allowed the attackers to gain unauthorized access and potentially inject malicious code into the software development lifecycle. The attack has impacted projects including Trivy, KICS, and LiteLLM, suggesting a broad targeting scope within the software development and cloud security sectors. This type of attack poses a significant risk to the integrity and security of the software supply chain, as compromised code can be distributed to numerous downstream users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a developer&rsquo;s machine or CI/CD environment via an unspecified initial access vector.</li>
<li>Deployment of an infostealer binary onto the compromised system.</li>
<li>The infostealer scans the local file system for .env files containing sensitive credentials.</li>
<li>The infostealer targets CI/CD environment variables to extract API keys, tokens, and other secrets.</li>
<li>The infostealer searches for cloud tokens, potentially targeting AWS credentials, Azure service principals, or GCP service account keys.</li>
<li>Extracted credentials are used to gain unauthorized access to GitHub accounts and CI/CD pipelines.</li>
<li>Attackers inject malicious code or dependencies into the targeted projects, potentially leading to supply chain contamination.</li>
<li>Compromised code is distributed to downstream users of Trivy, KICS, LiteLLM, and other impacted projects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The TeamPCP supply chain attack has impacted multiple companies and projects, including Trivy, KICS, and LiteLLM. The compromise of CI/CD pipelines and GitHub accounts allows attackers to inject malicious code into software projects, potentially affecting thousands of users. This can lead to data breaches, malware infections, and erosion of trust in the affected software. The exact number of victims is unknown, but the impact is significant due to the widespread use of the compromised projects in the cloud security and development sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement multi-factor authentication (MFA) on all GitHub accounts and CI/CD pipelines to prevent unauthorized access.</li>
<li>Rotate API keys and tokens regularly, especially those used in CI/CD environments, to minimize the impact of credential theft.</li>
<li>Implement secrets scanning in CI/CD pipelines to prevent accidental exposure of sensitive information in code repositories.</li>
<li>Deploy the Sigma rule &ldquo;Detect Infostealer Activity in CI/CD Environments&rdquo; to identify suspicious processes accessing environment variables.</li>
<li>Monitor file system access for unusual reads of .env files, using the &ldquo;Detect .env File Access&rdquo; Sigma rule.</li>
<li>Implement network monitoring to detect anomalous connections originating from CI/CD servers or developer workstations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain</category><category>ci/cd</category><category>infostealer</category></item><item><title>SnappyClient Malware Delivered via HijackLoader</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-snappyclient/</link><pubDate>Fri, 20 Mar 2026 05:19:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-snappyclient/</guid><description>SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.</description><content:encoded><![CDATA[<p>SnappyClient is a sophisticated malware delivered via HijackLoader, a known malware distribution platform. The malware exhibits a wide array of capabilities, indicative of its intent to compromise systems and exfiltrate sensitive data. These capabilities include screenshot capture, keylogging, establishing a remote terminal for interactive command execution, and targeted data theft from web browsers, browser extensions, and other applications. The combination of these functions points towards a threat actor focused on credential harvesting, data collection, and maintaining persistent access through remote command and control. Defenders should prioritize detection and prevention measures to mitigate the risk of SnappyClient infections. The initial report of this activity was published in March 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: HijackLoader infects the system (delivery mechanism unspecified).</li>
<li>Persistence: HijackLoader establishes persistence to ensure SnappyClient is executed upon system reboot.</li>
<li>Malware Deployment: HijackLoader deploys and executes the SnappyClient malware.</li>
<li>Screenshot Capture: SnappyClient begins capturing screenshots of the user&rsquo;s desktop activity using built-in OS functions.</li>
<li>Keylogging: SnappyClient logs keystrokes to capture sensitive information such as usernames, passwords, and financial details.</li>
<li>Browser Data Theft: SnappyClient targets web browsers and their extensions to steal cookies, saved credentials, and browsing history.</li>
<li>Remote Terminal: SnappyClient establishes a remote terminal, granting the attacker interactive command execution capabilities.</li>
<li>Data Exfiltration: Stolen data is exfiltrated to a command and control server controlled by the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful SnappyClient infections can result in significant data breaches, including the compromise of sensitive credentials, financial information, and personal data. The remote terminal functionality allows attackers to perform arbitrary actions on compromised systems, potentially leading to further damage or lateral movement within the network. While the number of victims and specific sectors targeted are unknown, the malware&rsquo;s capabilities make it a high-risk threat to organizations of all sizes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to enhance visibility into HijackLoader and SnappyClient execution (logsource: process_creation).</li>
<li>Implement network monitoring to detect and block connections to known HijackLoader command and control infrastructure.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect SnappyClient activity and tune for your environment.</li>
<li>Monitor registry modifications for persistence mechanisms used by HijackLoader to launch SnappyClient (logsource: registry_set).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>snappyclient</category><category>hijackloader</category><category>malware</category><category>infostealer</category><category>keylogger</category></item><item><title>DarkSword iOS Exploit Used in Infostealer Attack</title><link>https://feed.craftedsignal.io/briefs/2026-03-darksword-ios-exploit/</link><pubDate>Thu, 19 Mar 2026 19:08:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-darksword-ios-exploit/</guid><description>A new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.</description><content:encoded><![CDATA[<p>A new iOS exploit named &ldquo;DarkSword&rdquo; has been identified as being actively used in infostealer attacks against iPhones. While the specific details of the exploit remain limited in the provided source, its use signifies a significant threat to iOS users. The attackers are leveraging this exploit to potentially bypass security measures and gain unauthorized access to sensitive information stored on targeted devices. The lack of specific details regarding the exploit&rsquo;s technical aspects and targeted iOS versions makes it challenging to implement precise detection and mitigation strategies. However, the active exploitation necessitates immediate attention and proactive measures to safeguard iOS devices from potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attack begins with an unknown initial access vector, potentially involving malicious links or app sideloading techniques, leading to the execution of the DarkSword exploit.</li>
<li><strong>Exploit Execution:</strong> The DarkSword exploit is executed on the targeted iPhone, leveraging an unspecified vulnerability within the iOS operating system.</li>
<li><strong>Privilege Escalation:</strong> Successful exploitation leads to privilege escalation, granting the attacker elevated permissions on the compromised device.</li>
<li><strong>Infostealer Installation:</strong> The attacker leverages the escalated privileges to install an infostealer payload onto the device.</li>
<li><strong>Data Collection:</strong> The infostealer malware collects sensitive data, including contacts, messages, photos, and potentially credentials stored on the iPhone.</li>
<li><strong>Data Staging:</strong> The collected data is staged for exfiltration, potentially compressed and encrypted to evade detection.</li>
<li><strong>Command and Control (C2) Communication:</strong> The malware establishes a connection with a remote C2 server to receive further instructions and prepare for data exfiltration.</li>
<li><strong>Data Exfiltration:</strong> The stolen data is exfiltrated from the compromised iPhone to the attacker&rsquo;s C2 server via an encrypted channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful exploitation of the DarkSword exploit and deployment of the infostealer can lead to severe consequences for iPhone users. Stolen data can be used for identity theft, financial fraud, or other malicious purposes. The potential compromise of sensitive information stored on iPhones makes this a high-priority threat, impacting potentially a large number of users depending on the scope of the campaign.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual outbound connections from iOS devices, which may indicate C2 communication (log source: network_connection).</li>
<li>Implement a Mobile Threat Defense (MTD) solution capable of detecting and blocking exploit attempts and malicious app installations on iOS devices.</li>
<li>Encourage users to avoid sideloading apps from untrusted sources, as this increases the risk of installing malware (awareness training).</li>
<li>Deploy the Sigma rule to detect suspicious process execution patterns indicative of exploit activity (Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ios</category><category>exploit</category><category>infostealer</category><category>darksword</category></item><item><title>EmEditor Supply Chain Compromise Delivering Infostealer</title><link>https://feed.craftedsignal.io/briefs/2026-03-emeditor-supply-chain/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-emeditor-supply-chain/</guid><description>A trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.</description><content:encoded><![CDATA[<p>A supply chain compromise involving the EmEditor text editor led to the distribution of a trojanized installer. Attackers replaced the legitimate EmEditor installer with a malicious version containing an infostealer. This compromised installer was then distributed through trusted or official channels, deceiving users into installing the malware. This incident underscores the importance of verifying software integrity, even when obtained from seemingly reputable sources, and highlights the potential for significant damage when software supply chains are targeted. The goal is to steal sensitive information from victim machines. Defenders should focus on detecting anomalous process execution and network activity following software installations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the EmEditor software supply chain.</li>
<li>A malicious EmEditor installer is created, embedding an infostealer payload.</li>
<li>The trojanized installer is distributed through trusted or official EmEditor distribution channels.</li>
<li>Unsuspecting users download and execute the malicious installer on their Windows systems.</li>
<li>The installer executes the infostealer payload in the background.</li>
<li>The infostealer collects sensitive information such as credentials, browser data, and other valuable data.</li>
<li>The stolen data is exfiltrated to a command-and-control server controlled by the attacker.</li>
<li>The attacker uses the stolen information for further malicious activities, such as account compromise or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The EmEditor supply chain compromise resulted in the distribution of an infostealer to an unknown number of users. Victims who downloaded and installed the trojanized EmEditor installer had their sensitive information stolen, potentially leading to financial loss, identity theft, and further compromise of their systems and accounts. The software supply chain compromise can erode trust in legitimate software vendors and distribution channels.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement robust software integrity verification mechanisms, such as checking digital signatures and file hashes, before installing any software (reference: overview).</li>
<li>Monitor for unusual process execution and network connections after software installations to detect potential post-compromise activity (reference: attack chain).</li>
<li>Deploy the Sigma rules provided below to detect potential infostealer activity and malicious installer execution (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>infostealer</category><category>windows</category></item></channel></rss>