Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

PearOS Brings Mac-Degree Polish to Any Growing older Laptop computer for Free

March 16, 2026

Elder Scrolls On-line Replace 49: Dragonknight Rework, Free Rewards, and the Street to Season Zero

March 16, 2026

Bengaluru startup Hooly is constructing an AI health coach that understands motivation

March 16, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • PearOS Brings Mac-Degree Polish to Any Growing older Laptop computer for Free
  • Elder Scrolls On-line Replace 49: Dragonknight Rework, Free Rewards, and the Street to Season Zero
  • Bengaluru startup Hooly is constructing an AI health coach that understands motivation
  • Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Substitute Mounted Residual Mixing with Depth-Clever Consideration for Higher Scaling in Transformers
  • Pixelpaw Labs’ Section Delivers Mouse Precision and Controller Consolation in One Cut up System
  • 👨🏿‍🚀TechCabal Day by day – Your DStv might change into cheaper
  • Mazagan Seashore & Golf Resort Celebrates Commencement of Third Cohort of Girls’s Management Program
  • Tencent Cloud Turns into Sponsor of OpenClaw Group
Monday, March 16
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - From Browser Stealer to Intelligence-Gathering Device
Cybersecurity & Digital Rights

From Browser Stealer to Intelligence-Gathering Device

NextTechBy NextTechJune 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
From Browser Stealer to Intelligence-Gathering Device
Share
Facebook Twitter LinkedIn Pinterest Email


Jun 28, 2025Ravie LakshmananMalware / Cyber Warfare

The risk actor behind the GIFTEDCROOK malware has made important updates to show the trojan horse from a fundamental browser knowledge stealer to a potent intelligence-gathering instrument.

“Current campaigns in June 2025 reveal GIFTEDCROOK’s enhanced capability to exfiltrate a broad vary of delicate paperwork from the gadgets of focused people, together with doubtlessly proprietary recordsdata and browser secrets and techniques,” Arctic Wolf Labs stated in a report printed this week.

“This shift in performance, mixed with the content material of its phishing lures, […] suggests a strategic deal with intelligence gathering from Ukrainian governmental and army entities.”

GIFTEDCROOK was first documented by the Laptop Emergency Response Group of Ukraine (CERT-UA) in early April 2025 in reference to a marketing campaign concentrating on army entities, regulation enforcement companies, and native self-government our bodies.

Cybersecurity

The exercise, attributed to a hacking group it tracks as UAC-0226, entails the usage of phishing emails containing macro-laced Microsoft Excel paperwork that act as a conduit to deploy GIFTEDCROOK.

An data stealer at its core, the malware is designed to steal cookies, shopping historical past, and authentication knowledge from common net browsers equivalent to Google Chrome, Microsoft Edge, and Mozilla Firefox.

Arctic Wolf’s evaluation of the artifacts has revealed that the stealer began off as a demo in February 2025, earlier than gaining new options with variations 1.2 and 1.3.

floaww

These new iterations embody the flexibility to reap paperwork and recordsdata under 7 MB in dimension, particularly in search of recordsdata created or modified throughout the final 45 days. The malware particularly searches for the next extensions: .doc, .docx, .rtf, .pptx, .ppt, .csv, .xls, .xlsx, .jpeg, .jpg, .png, .pdf, .odt, .ods, .rar, .zip, .eml, .txt, .sqlite, and .ovpn.

The e-mail campaigns leverage military-themed PDF lures to entice customers into clicking on a Mega cloud storage hyperlink that hosts a macro-enabled Excel workbook (“Список оповіщених військовозобов’язаних організації 609528.xlsm”), inflicting GIFTEDCROOK to be downloaded when the recipient activates macros. Many customers do not realize how frequent macro-enabled Excel recordsdata are in phishing assaults. They slip previous defenses as a result of individuals typically count on spreadsheets in work emails—particularly ones that look official or government-related.

The captured data is bundled right into a ZIP archive and exfiltrated to an attacker-controlled Telegram channel. If the overall archive dimension exceeds 20 MB, it’s damaged down into a number of elements. By sending stolen ZIP archives in small chunks, GIFTEDCROOK avoids detection and skips round conventional community filters. Within the remaining stage, a batch script is executed to erase traces of the stealer from the compromised host.

Cybersecurity

This is not nearly stealing passwords or monitoring on-line conduct—it is focused cyber espionage. The malware’s new capability to sift by way of latest recordsdata and seize paperwork like PDFs, spreadsheets, and even VPN configs factors to an even bigger aim: gathering intelligence. For anybody working in public sector roles or dealing with delicate inner reviews, this sort of doc stealer poses an actual danger—not simply to the person, however to the whole community they’re linked to.

“The timing of the campaigns mentioned on this report demonstrates clear alignment with geopolitical occasions, notably the latest negotiations between Ukraine and Russia in Istanbul,” Arctic Wolf stated.

“The development from easy credential theft in GIFTEDCROOK model 1, to complete doc and knowledge exfiltration in variations 1.2 and 1.3, displays coordinated improvement efforts the place malware capabilities adopted geopolitical goals to boost knowledge assortment from compromised programs in Ukraine.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Cases Stay Uncovered

March 16, 2026

A Man Who Wrote the Code Died in 2005. I Nonetheless Should Safe It

March 15, 2026

Veeam Patches 7 Essential Backup & Replication Flaws Permitting Distant Code Execution

March 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

PearOS Brings Mac-Degree Polish to Any Growing older Laptop computer for Free

By NextTechMarch 16, 2026

Outdated laptops have a behavior of ending up in a drawer the second producers cease…

Elder Scrolls On-line Replace 49: Dragonknight Rework, Free Rewards, and the Street to Season Zero

March 16, 2026

Bengaluru startup Hooly is constructing an AI health coach that understands motivation

March 16, 2026
Top Trending

PearOS Brings Mac-Degree Polish to Any Growing older Laptop computer for Free

By NextTechMarch 16, 2026

Outdated laptops have a behavior of ending up in a drawer the…

Elder Scrolls On-line Replace 49: Dragonknight Rework, Free Rewards, and the Street to Season Zero

By NextTechMarch 16, 2026

Replace 49 has formally landed in The Elder Scrolls On-line (ESO), and…

Bengaluru startup Hooly is constructing an AI health coach that understands motivation

By NextTechMarch 16, 2026

Final 12 months, when Varun Francis and Pavan Gowda began constructing Hooly—whose…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!