August 2025 Infostealer Trend Report

August 2025 Infostealer Trend Report

This report provides statistics, trends, and case information on Infostealer, including distribution volume, distribution methods, and disguises based on the data collected and analyzed in August 2025. The following is a summary of the original report.   1) Data Source and Collection Methods   AhnLab SEcurity intelligence Center (ASEC) operates

Ransomware Disguised as Password Cracker (Extension Changed to .NS1419)

Ransomware Disguised as Password Cracker (Extension Changed to .NS1419)

The AhnLab SEcurity intelligence Center (ASEC) recently discovered ransomware being distributed disguised a password cracker tool. Such tools are typically used in brute force attacks.  Brute force attacks involve by trying every possible combination to find the correct password. Attackers repeatedly attempt to breach a system’s authentication procedure to steal

LummaC2 Malware Distributed Disguised as Total Commander Crack

LummaC2 Malware Distributed Disguised as Total Commander Crack

AhnLab SEcurity intelligence Center (ASEC) has discovered the LummaC2 malware being distributed disguised as the Total Commander tool. Total Commander is a file manager for Windows that supports various file formats. It offers convenient file management features such as copy and move features, advanced search using strings within files, folder

ACRStealer Infostealer Exploiting Google Docs as C2

ACRStealer Infostealer Exploiting Google Docs as C2

AhnLab SEcurity intelligence Center (ASEC) monitors the Infostealer malware disguised as illegal programs such as cracks and keygens being distributed, and publishes related trends and changes through the Ahnlab TIP and ASEC Blog posts. While the majority of the malware distributed in this manner has been the LummaC2 Infostealer, the

Warning Against the Distribution of Malware Disguised as Software Cracks (Disrupts V3 Lite Installation)

Warning Against the Distribution of Malware Disguised as Software Cracks (Disrupts V3 Lite Installation)

AhnLab SEcurity intelligence Center (ASEC) has previously introduced the dangers of malware disguised as crack programs through a post titled  “Distribution of Malware Under the Guise of MS Office Cracked Versions (XMRig, OrcusRAT, etc.)”. [1] Malware strains disguised as crack programs are primarily distributed through file-sharing platforms, blogs, and torrents, leading

Botnet Installing NiceRAT Malware

Botnet Installing NiceRAT Malware

1. Overview AhnLab Security intelligence Center (ASEC) confirmed that botnets trending since 2019 have been continuously used to install NiceRAT malware. A botnet is a group of devices infected by malware and controlled by a threat actor. Because threat actors mainly launched DDoS attacks using botnets in the past, Nitol

Warning Against Infostealer Infections Upon Executing Legitimate EXE Files (DLL Hijacking)

Warning Against Infostealer Infections Upon Executing Legitimate EXE Files (DLL Hijacking)

Caution is advised as an Infostealer that prompts the execution of legitimate EXE files is actively being distributed. The threat actor is distributing a legitimate EXE file with a valid signature and a malicious DLL compressed in the same directory. The EXE file itself is legitimate, but when executed in

Nitol DDoS Malware Installing Amadey Bot

Nitol DDoS Malware Installing Amadey Bot

The ASEC analysis team recently discovered that a threat actor has been using Nitol DDoS Bot to install Amadey. Amadey is a downloader that has been in circulation since 2018, and besides extorting user credentials, it can also be used for the purpose of installing additional malware. Amadey is being

A Dropper-Type Malware Bomb Being Distributed Again in the Disguise of Cracks

A Dropper-Type Malware Bomb Being Distributed Again in the Disguise of Cracks

The dropper malware which camouflaged itself as a crack is being actively distributed again after a period of dormancy. When this malware is executed, the affected system becomes infected with numerous malware programs simultaneously. This is effectively a malware “bomb.” Malware disguised as cracks for commercial software have been prevalent,

New Infostealer ‘ColdStealer’ Being Distributed

New Infostealer ‘ColdStealer’ Being Distributed

The ASEC analysis team has discovered the distribution of ColdStealer that appears to be a new type of infostealer. The malware disguises itself as a software download for cracks and tools, a distribution method that was mentioned multiple times in previous ASEC blog posts. There are two cases for this