A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular
ClickFix social engineering tactic initiated via fake CAPTCHA verification pages.
"Based on a similar
self-deletion technique observed in
Latrodectus, EDDIESTEALER is capable of deleting itself through NTFS Alternate Data Streams renaming, to bypass file locks," Elastic noted.
Another noteworthy feature built into the stealer is its
ability to bypass Chromium's app-bound encryption to gain access to unencrypted sensitive data, such as cookies. This is accomplished by including a Rust implementation of
ChromeKatz, an open-source tool that can dump cookies and credentials from the memory of Chromium-based browsers.
Katz Stealer, like EDDIESTEALER, is engineered to
circumvent Chrome's app-bound encryption, but in a different way by employing
DLL injection to obtain the
encryption key without administrator privileges and use it to decrypt encrypted cookies and passwords from Chromium-based browsers.
New Rust-based EDDIESTEALER spreads via fake CAPTCHA pages, stealing credentials and bypassing Chrome encryption.
thehackernews.com