Commercial stealer-as-a-service campaign delivers Phantom Stealer across European enterprises via phishing
Summary
Hide ▲
Show ▼
A coordinated phishing campaign from November 2025 to January 2026 delivered the .NET-based Phantom Stealer infostealer to organizations in European logistics, manufacturing and technology sectors. The malware was distributed as a commercial toolkit bundling a stealer, crypter and remote access tool (RAT) under subscription tiers, enabling credential harvesting, session data theft and sensitive information exfiltration via messaging platforms, SMTP and FTP. Attackers impersonated a legitimate equipment trading company, using procurement-themed emails with professional formatting and consistent email authentication failures to bypass defenses.
Timeline
-
31.03.2026 17:00 1 articles · 15h ago
Phantom Stealer delivered via stealer-as-a-service phishing campaign across Europe
Between November 2025 and January 2026, a phishing campaign delivered the Phantom Stealer infostealer to European organizations in logistics, manufacturing and technology sectors. The campaign used procurement-themed emails with professional formatting, consistent email authentication failures and obfuscated droppers or executables to distribute a .NET-based infostealer bundled with a crypter and RAT under a commercial subscription model.
Show sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
Information Snippets
-
The infostealer, named Phantom Stealer, targets browser credentials, cookies, saved passwords, autofill data and payment card information.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
Phantom Stealer also extracts session data from messaging and email platforms, Wi-Fi credentials and other sensitive information.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
Stolen data is exfiltrated via messaging platforms, SMTP and FTP.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
The campaign operated in five waves between November 2025 and January 2026, targeting organizations in logistics, manufacturing and technology sectors across Europe.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
Phishing emails included obfuscated JavaScript droppers or malicious executables disguised as archive attachments with procurement-related subject lines.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
Campaign indicators included SPF authentication failures, missing DKIM signatures, reused email templates, consistent spelling mistakes, spoofed business identities and rotating infrastructure.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00
-
Detection involved layered analysis combining sender authentication checks, content analysis and malware detonation in a controlled environment.
First reported: 31.03.2026 17:001 source, 1 articleShow sources
- Phantom Project Bundles Infostealer, Crypter and RAT For Sale — www.infosecurity-magazine.com — 31.03.2026 17:00