Cybersecurity researchers from Gen Digital have uncovered a sophisticated new information-stealing malware called Glove Stealer that specifically targets browser data, cryptocurrency wallets, and authentication credentials by exploiting Chrome's IElevator service to bypass App-Bound encryption.
"Glove Stealer represents a concerning evolution in information-stealing malware, combining social engineering tactics with technical sophistication to compromise user data," researchers revealed in a detailed analysis published Tuesday.
The malware, written in .NET, is being distributed through phishing campaigns that mimic ClickFix, a legitimate troubleshooting tool. Users receive HTML attachments containing fake error messages that trick them into executing malicious PowerShell commands.
Example ClickFix HTML page being distributed in phishing email attachments (Image Source: Gen Digital)
What makes Glove Stealer particularly dangerous is its ability to bypass Chrome's App-Bound encryption, introduced in version 127, by exploiting the IElevator service - a technique that was only recently disclosed by security researcher Alexander Hagenah in late October 2024.
The malware's capabilities include:
Stealing data from over 280 browser extensions and 80+ local applications
Targeting cryptocurrency wallets, 2FA authenticators, and password managers
Harvesting cookies, autofill data, and login credentials
Exfiltrating sensitive information from email clients and gaming platforms
The infection chain begins with phishing emails containing HTML attachments that display fake error messages. When users follow the "fixing" instructions, they unknowingly execute a malicious script that downloads Glove Stealer from command-and-control (C2) servers like "master.volt-texs[.]online".
To maintain stealth, the malware terminates browser processes for Chrome, Edge, Opera, Brave, and others before extracting sensitive data. It organizes stolen information into categorized directories, encrypting the data using 3DES encryption before exfiltration.
"The malware employs a dedicated supporting module that must be placed in Chrome's Program Files directory to successfully bypass the App-Bound encryption," the researchers explained. "This requires local admin privileges, highlighting the sophisticated nature of the attack."
The stolen data is meticulously organized into specific directories:
\AllPws.txt for passwords
\Cookies\ for browser cookies
\Autofill\ for form data
\OTP\ for two-factor authentication data
\Wallets\ for cryptocurrency credentials
The malware also creates a detailed system fingerprint containing information about the victim's operating system, hardware, and user environment.
To protect against Glove Stealer infections, security experts recommend:
Being cautious of emails containing HTML attachments
Never copying and pasting commands from untrusted sources
Keeping browsers and security software up to date
Using strong authentication methods for sensitive accounts
The discovery of Glove Stealer highlights the ongoing evolution of information-stealing malware and the importance of maintaining robust security practices, especially as attackers continue to find new ways to bypass modern browser security features.
Researchers have published indicators of compromise (IoCs) and detailed technical analysis to help organizations detect and prevent Glove Stealer infections. The investigation into the malware's distribution networks and potential connections to other cybercrime operations is ongoing.
Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.