Google Docs used by infostealer ACRStealer as part of attack
#1
Google Docs used by infostealer ACRStealer as part of attack
 
[Image: sTASzzb.png]


Malwarebytes Blog reports an 'ACRStealer' exploiting 'Google Docs' to steal credentials, crypto wallets, extract browser data, FTP credentials and all text files. Previously the malware (ACRStealer) was using platforms like 'Steam' and 'telegra.ph'. Now it has shifted to exploit various forms of 'Google Docs' -- Forms ands Presentations. This new approach will allow attackers to change the compromised C2 domain thereby modifying the information within the intermediary C2. Here is Malwarebytes' Pieter Arntz take on the threat.
Quote:An infostealer known as ACRStealer is using legitimate platforms like 'Google Docs' as part of an attack, according to researchers.

ACRStealer is a new information-stealing malware often distributed via the tried and tested method of download as cracks and keygens, which are used in software piracy. The infostealer has been around since mid-2024 (as a beta test), but it’s only really taken off in 2025. ACRStealer is capable of:
 
  • Identifying which antivirus solution is on a device
  • Stealing crypto wallets and login credentials
  • Stealing browser information
  • Harvesting File Transfer Protocol (FTP) credentials
  • Reading all text files

With that kind of information, cybercriminals can go after your cryptocurrency and other funds. With the capture of usernames and passwords from web browsers, attackers can access your accounts, including email, social media, and financial services. They may even gather enough personal data to be used for identity theft or sold on the dark web.

What stands out in the recently-found ACRStealer variants is the way they communicate with the command and control (C2) server—a computer which is used to send commands to systems compromised by malware and receive stolen data from a target network. Rather than hard-coding the IP address in the malware, they chose to use a method called Dead Drop Resolver (DDR), where the malware contacts a legitimate platform like Google Docs or Steam to read what the C2 domain is.

This is good for the cybercriminals as it means they can easily change the domain if one gets discontinued, seized, or blocked. All they need to do is update the Google Doc.

And outgoing calls to docs.google.com will not easily trigger an alarm, so it helps in staying under the radar.


Stay safe from the ACRStealer

Like many other information stealers, ARCStealer is operated under the Malware-as-a-Service (MaaS) model, where criminals rent out the malware and the infrastructure to other criminals. That makes it hard to know exactly how to defend yourself.

However, there are some things you can do:
 
  • Stay away from websites offering cracks and keygens
  • Download software from the official publisher wherever possible
  • Don’t click on links in unsolicited communications (email, texts, DMs, etc)
  • Don’t open unverified attachments
  • Use multi-factor authentication (MFA) wherever you can, so even if cybercriminals steal your login details they won’t be able to get into your account
  • Use an active and up-to-date anti-malware solution.

Malwarebytes recognizes new variants of ACRStealer by behavior, which will result in the detection name of Malware.AI.{ID-number}.
 

Info derived and lifted from Malwarebytes with permission
[-] The following 1 user says Thank You to jasonX for this post:
  • harlan4096
Reply


Messages In This Thread
Google Docs used by infostealer ACRStealer as part of attack - by jasonX - 25 February 25, 10:42

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Internet Download Manager 6.32 Build 9
Internet Downloa...Kool — 09:20
Free Download Manager 6.26.2.6190
Changes in 6.26.2....harlan4096 — 07:08
Thunderbird Version 128.9.1 (ESR)
Thunderbird Versio...harlan4096 — 07:06
Thunderbird Version 137.0.1
Thunderbird Versio...harlan4096 — 07:06
Europe proposes backdoors in encrypted p...
The ProtectEU plan...harlan4096 — 07:05

[-]
Birthdays
Today's Birthdays
avatar (42)Sanfordbup
avatar (37)Der.Reisende
Upcoming Birthdays
avatar (44)wapedDow
avatar (48)oapedDow
avatar (41)Sanchowogy
avatar (45)MeighGoask
avatar (46)creatralGuelm
avatar (37)procnipsut
avatar (43)accenwibly
avatar (40)ahyvily
avatar (37)urumahiz
avatar (43)techlignub
avatar (42)Stevenmam
avatar (49)onlinbah
avatar (49)fuspeukChark
avatar (43)werriewWaiNg
avatar (37)Freemanleo
avatar (42)cdoubapKit
avatar (37)lystraPonia
avatar (30)smith8395john
avatar (50)steakelask
avatar (44)Termoplenka
avatar (42)bycoPaist
avatar (48)pieloKat
avatar (42)ilyagNeexy
avatar (50)donitascene
avatar (50)burntLaw
avatar (40)MrDoorsskibheeds
avatar (50)Toligo
avatar (45)Rodneykak
avatar (48)tradeSmode
avatar (38)vemedProkbior
avatar (37)RobertUtelt
avatar (45)JamesZic

[-]
Online Staff
There are no staff members currently online.

>