Threat actors behind the new ‘Erbium’ information-stealing malware are distributing it as fake cracks and cheats for popular video games to steal victims’ credentials and cryptocurrency wallets.
The Erbium info-stealing malware was first spotted by researchers at threat intelligence firm Cluster25 on July 21, 2022. The Malware-as-a-Service (MaaS) was advertised on a Dark Web forum by a Russian-speaking threat actor.
The author said that he spent several months developing Erbium which supports unique functionalities. According to cybersecurity firm Cyfirma, the Erbium Stealer supports the following capabilities:
“Recently CYFIRMA’s research team detected a new sample of Erbium stealer in wild. We observed one of the recent gaming campaigns where the threat actors lure gamers/players who want to acquire an unfair or prohibited edge over other players with the malicious binary posted on MediaFire [free service for file hosting].” states CYFIRMA. “Threat actors are spreading this malware using drive-by-download techniques and pretending as cracked software/game hacks.”
Experts at Cyfirma recently analyzed a new sample Erbium stealer in the wild targeting gamers and players. Threat actors were offering to the gamers malicious binaries masquerading as software that can give them a prohibited edge over other players.
Initially, the malware was sold at a price ranging between 9 to 150 dollars depending on the subscription plan that goes from one week to one year of license. Starting from July, the authors significantly increased the price which ranges from 100 dollars up to a thousand dollars for a one-year subscription and access to a control panel.
Cluster25 researchers discovered that the malware is administered through a Telegram bot.
The malware can harvest the following information from the victim systems:
“Erbium is an info-stealer capable of strongly impacting the confidentiality and integrity of the data and information contained in the systems it affects and is an example of how the panorama of malicious tools is constantly evolving, offering proposals that are increasingly within reach of all, in consideration of the low selling prices.” says Emanuele De Lucia, Director of Cyber Intelligence presso Cluster25.
According to Cluster25 visibility, the malware has already infected systems in multiple countries, including the USA, France, Colombia, Spain, Italy, India, Vietnam, and Malaysia.
“Cyber-crime is constantly evolving within an underground market where it is not uncommon to come across new proposals for the purchase of MaaS solutions. In Cluster25’s opinion Erbium could become one of the most used infostealers by cyber criminals due to its wide range of capabilities and due to the growing demand for MaaS.” concludes Cluster25.
Both Cluster25 and Cyfirma shared Indicators of Compromise (IoCs) for this threat.
Follow me on Twitter: @securityaffairs and Facebook
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, Erbium stealer)