Table of Contents
  • Home
  • /
  • Blog
  • /
  • Glove Stealer Malware Bypasses Chrome's Encryption Defenses
November 16, 2024
|
3m

Glove Stealer Malware Bypasses Chrome's Encryption Defenses


Glove Stealer Malware Challenges Chrome Security

Cybersecurity researchers from Gen Digital have uncovered a sophisticated new information-stealing malware called Glove Stealer that specifically targets browser data, cryptocurrency wallets, and authentication credentials by exploiting Chrome's IElevator service to bypass App-Bound encryption.

"Glove Stealer represents a concerning evolution in information-stealing malware, combining social engineering tactics with technical sophistication to compromise user data," researchers revealed in a detailed analysis published Tuesday.

The malware, written in .NET, is being distributed through phishing campaigns that mimic ClickFix, a legitimate troubleshooting tool. Users receive HTML attachments containing fake error messages that trick them into executing malicious PowerShell commands.

Example ClickFix HTML page being distributed in phishing email attachments (Image Source: Gen Digital)

What makes Glove Stealer particularly dangerous is its ability to bypass Chrome's App-Bound encryption, introduced in version 127, by exploiting the IElevator service - a technique that was only recently disclosed by security researcher Alexander Hagenah in late October 2024.

The malware's capabilities include:

  • Stealing data from over 280 browser extensions and 80+ local applications

  • Targeting cryptocurrency wallets, 2FA authenticators, and password managers

  • Harvesting cookies, autofill data, and login credentials

  • Exfiltrating sensitive information from email clients and gaming platforms

The infection chain begins with phishing emails containing HTML attachments that display fake error messages. When users follow the "fixing" instructions, they unknowingly execute a malicious script that downloads Glove Stealer from command-and-control (C2) servers like "master.volt-texs[.]online".

To maintain stealth, the malware terminates browser processes for Chrome, Edge, Opera, Brave, and others before extracting sensitive data. It organizes stolen information into categorized directories, encrypting the data using 3DES encryption before exfiltration.

"The malware employs a dedicated supporting module that must be placed in Chrome's Program Files directory to successfully bypass the App-Bound encryption," the researchers explained. "This requires local admin privileges, highlighting the sophisticated nature of the attack."

The stolen data is meticulously organized into specific directories:

  • \AllPws.txt for passwords

  • \Cookies\ for browser cookies

  • \Autofill\ for form data

  • \OTP\ for two-factor authentication data

  • \Wallets\ for cryptocurrency credentials

The malware also creates a detailed system fingerprint containing information about the victim's operating system, hardware, and user environment.

To protect against Glove Stealer infections, security experts recommend:

  • Being cautious of emails containing HTML attachments

  • Never copying and pasting commands from untrusted sources

  • Keeping browsers and security software up to date

  • Using strong authentication methods for sensitive accounts

The discovery of Glove Stealer highlights the ongoing evolution of information-stealing malware and the importance of maintaining robust security practices, especially as attackers continue to find new ways to bypass modern browser security features.

Researchers have published indicators of compromise (IoCs) and detailed technical analysis to help organizations detect and prevent Glove Stealer infections. The investigation into the malware's distribution networks and potential connections to other cybercrime operations is ongoing.

Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe