Threat Actor Offered Malware Service of ACR Stealer for Sale – Daily Dark Web

Threat Actor: “Unknown threat actor”
Victim: N/A

Information:
🌟 The threat actor is offering the Malware Service of ACR Stealer for sale.
🌟 The ACR Stealer is developed in C++ and supports Windows 7-10 + servers.
🌟 It utilizes its own spacer servers and offers the option for personal installation.
🌟 The malware has data collection capabilities from 35 major browsers, 173 browser wallet extensions and 2FA, and 25 software applications.
🌟 It features a custom file grabber and can add specific software with seamless integration and encryption updates.
🌟 The ACR Stealer has auto tags, a traffic system, a download system, the ability to transmit logs via Telegram, sharing statistics, and a range of filters.
🌟 The price for this stealer tool is $250 per month or $700 for three months.

In a concerning development, the Malware Service of ACR Stealer has been made available for sale by a threat actor. Here are its main characteristics: Developed in C++, it supports Windows 7-10 + servers and utilizes its own spacer servers. However, it also offers the option for personal installation.

The data collection capabilities include gathering information from 35 major browsers (Chrome and Gecko), 173 browser wallet extensions and 2FA, and 25 software applications such as desktop wallets, instant messengers, FTP, and email clients. Additionally, it features a custom file grabber. Upon request, specific software can be added with seamless integration and encryption updates, taking less than a minute even in operating mode without requiring a new build.

Among its notable features are auto tags, a traffic system, a download system, the ability to transmit logs via Telegram, sharing statistics, and a range of filters.

This stealer tool, priced at a staggering $250 per month, $700 for three months by threat actor.

Source: Original Post