LeakyInjector and LeakyStealer Malware Campaign Steals Cryptocurrencies and Browser Data

Date:

A sophisticated threat campaign has emerged, marked by the pairing of LeakyInjector and LeakyStealer, two newly discovered malware strains targeting users to siphon cryptocurrency assets and browser history.

Hybrid Analysis’s deep dive exposes these threats’ technical prowess and operational coordination, signaling a dangerous escalation in cybercriminal ambition throughout October 2025.

File Summary

Two-Stage Attack: Precision and Stealth

The infection cycle begins with LeakyInjector, a 64-bit Windows executable ingeniously signed with a valid Extended Validation (EV) digital certificate.

This unusual legitimacy enables it to bypass security scrutiny, while its large file size, padded with null bytes, further hinders detection.

Upon execution, LeakyInjector searches for the explorer.exe process and deploys low-level Windows APIs to inject an encrypted payload, LeakyStealer, into memory.

This…

Read more…

Share post:

Subscribe

spot_imgspot_img

Popular

More like this
Related

Tampa RV giant Lazydays to delist from Nasdaq

Tampa-based Lazydays Holdings Inc., one of Florida’s most recognized...

Granite Geek: New Hampshire might get access to ‘balcony solar’

I had solar panels put on my roof six...

TSX Today: What to Watch for in Stocks on Monday, November 10

Despite firm gold and silver prices, Canadian stocks...

While BNB and DOT Struggle Under Market Pressure, BlockDAG’s Presale Soars Past $435M!

As market-wide fear grips the sector, the Binance Coin...