
YouTube videos and Discord channels are leveraged to distribute a new infostealer called Arcane Stealer disguised as game cheats or tools. It collects a vast amount of sensitive data from users, targeting various applications and services across gaming, VPNs, and messaging platforms.Â
Kaspersky security researchers have been observing an infostealer campaign that uses YouTube videos to promote downloadable game cheats. These videos include links to password-protected archives.Â
Once downloaded and unpacked, this sophisticated malware asks unsuspecting users to execute a batch file that triggers the download and activation of the malware while simultaneously disabling SmartScreen protection on their systems. Â
The archive contains two executables – a miner and a stealer. Before late 2024, the stealer was a Phemedrone Trojan variant named VGS by the attackers. A new, frequently updated Arcane Stealer then replaced VGS in the same campaign, borrowing much from other stealers.
Further distribution efforts have included ArcanaLoader, a tool promoted heavily through Discord, which advertises popular cheats and cracks but secretly delivers the Arcane Stealer. Â
The Arcane Stealer harvests a broad range of data, including but not limited to:
Notably, the Arcane Stealer uses advanced techniques like exploiting Chrome's debugging port and DPAPI (Data Protection API) to extract critical data, including browser encryption keys. Â
Though the malware has global potential, the campaign primarily targets Russian-speaking users based on its telemetry data, the language of communication on associated Discord servers, and the audience of the gaming cheat videos.