CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

SantaStealer Malware-as-a-Service Targets Browsers and Crypto Wallets

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new malware-as-a-service (MaaS) named SantaStealer is being advertised on Telegram and hacker forums. Developed by a Russian-speaking actor, it is a rebranded version of BluelineStealer. The malware steals data from browsers, cryptocurrency wallets, and other applications, operating in memory to avoid file-based detection. Despite claims of advanced evasion techniques, samples analyzed by Rapid7 reveal poor operational security and incomplete development. SantaStealer uses 14 data-collection modules to exfiltrate information via a hardcoded C2 endpoint. The malware is not yet fully operational, but its planned distribution methods include ClickFix attacks, phishing, pirated software, and malvertising.

Timeline

  1. 16.12.2025 00:43 1 articles · 19h ago

    SantaStealer Malware-as-a-Service Advertised Ahead of Launch

    SantaStealer, a new malware-as-a-service, is being advertised on Telegram and hacker forums. Developed by a Russian-speaking actor, it is a rebranded version of BluelineStealer. The malware targets browsers, cryptocurrency wallets, and other applications, using 14 data-collection modules to exfiltrate information. Rapid7's analysis revealed poor operational security, with unencrypted strings and leaked samples. The malware is not yet fully operational, but its planned distribution methods include ClickFix attacks, phishing, pirated software, and malvertising.

    Show sources

Information Snippets