Threat actors have leveraged a VBA downloader, VBA dropper, executable downloader, and link downloader to deploy the novel Fickle Stealer malware, Security Affairs reports.Attacks with the Rust-based information-stealing payload also involved a PowerShell script meant to evade User Account Control, escalate privileges, and enable data exfiltration activities, according to a report from Fortinet FortiGuard Labs.Researchers noted that executing Fickle Stealer would prompt the delivery of victim information to attacker-controlled servers and anti-analysis checks before proceeding with the theft of data from AnyDesk, Telegram, Signal, Skype, Discord, Steam, FileZilla, and other apps, as well as plugins, cryptocurrency wallets, and Chromium- and Gecko-based web browsers.Other sensitive files within installation directories' parent directories are also being scanned by Fickle Stealer, which has been made even more versatile in its data-gathering capabilities by a server-based target list. "Variants receiving an updated list are observed. The frequently updated attack chain also shows that it's still in development," said the report.
Network Security, Malware, Threat Intelligence
Multiple attack vectors leveraged to deliver new Fickle Stealer malware

(Sashkin via Adobe Stock Images)
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds