Raven Stealer Infostealer Targets Chromium Browsers and Applications
Summary
Hide β²
Show βΌ
A new infostealer malware, Raven Stealer, targets Chromium-based browsers and other applications to steal credentials and data. Developed in Delphi and C++, Raven Stealer is distributed via underground forums and cracked software. It uses Telegram for command-and-control and data exfiltration, making it difficult to detect. The malware harvests cookies, autofill entries, browsing history, and other sensitive information from browsers like Google Chrome and Microsoft Edge. It also steals credentials from various applications and performs real-time data exfiltration. Raven Stealer represents a persistent threat to both personal and enterprise environments. Raven Stealer is promoted via a dedicated Telegram channel and offers a streamlined user interface and support for dynamic modules. Upon execution, the malware aggregates harvested data into a well-organized format and transmits it to the threat actor. It targets browser-based authentication data, including saved passwords and session cookies, and accesses local storage paths and credential vaults to extract this data. The malware uses Telegram for exfiltration, sending stolen data through encrypted messaging channels. After exfiltration, Raven Stealer reboots into Safe Mode with Networking and uses UltraAV antivirus to delete malicious files, eliminating any trace of its activity.
Timeline
-
17.09.2025 15:06 π° 1 articles Β· β± 6h ago
Raven Stealer Infostealer Targets Chromium Browsers and Applications
A new infostealer malware, Raven Stealer, targets Chromium-based browsers and other applications to steal credentials and data. Developed in Delphi and C++, Raven Stealer is distributed via underground forums and cracked software. It uses Telegram for command-and-control and data exfiltration, making it difficult to detect. The malware harvests cookies, autofill entries, browsing history, and other sensitive information from browsers like Google Chrome and Microsoft Edge. It also steals credentials from various applications and performs real-time data exfiltration. Raven Stealer aggregates harvested data into a well-organized format and transmits it to the threat actor. The malware targets browser-based authentication data, including saved passwords and session cookies, and accesses local storage paths and credential vaults to extract this data. After exfiltration, Raven Stealer reboots into Safe Mode with Networking and uses UltraAV antivirus to delete malicious files, eliminating any trace of its activity.
Show sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
Information Snippets
-
Raven Stealer is a lightweight infostealer malware developed in Delphi and C++.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
The malware is distributed via underground forums and cracked software.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
Raven Stealer targets Chromium-based browsers and other applications to steal credentials and data.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
The malware uses Telegram for command-and-control and data exfiltration.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
Raven Stealer harvests cookies, autofill entries, browsing history, and other sensitive information.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
The malware aggregates harvested data into a well-organized format and transmits it to the threat actor.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
Raven Stealer targets browser-based authentication data, including saved passwords and session cookies.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
The malware uses Telegram for exfiltration, sending stolen data through encrypted messaging channels.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
After exfiltration, Raven Stealer reboots into Safe Mode with Networking and uses UltraAV antivirus to delete malicious files.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06
-
Raven Stealer represents a persistent threat to both personal and enterprise environments.
First reported: 17.09.2025 15:06π° 1 source, 1 articleShow sources
- Raven Stealer Scavenges Chromium Data via Telegram β www.darkreading.com β 17.09.2025 15:06