Sunday, June 15, 2025
HomeBrowserChihuahua Stealer Exploits Google Drive Document to Harvest Browser Login Credentials

Chihuahua Stealer Exploits Google Drive Document to Harvest Browser Login Credentials

Published on

SIEM as a Service

Follow Us on Google News

A .NET-based infostealer named “Chihuahua Stealer” has been discovered using sophisticated techniques to infiltrate systems and exfiltrate sensitive data.

This malware, which blends common malware strategies with unusually advanced features, was first highlighted through a Reddit post where a user was tricked into executing an obfuscated PowerShell script via a Google Drive document.

Initial Vector and Execution Chain

The infection chain begins with a user being deceived into downloading what appears to be a legitimate document stored on Google Drive or OneDrive.

- Advertisement - Google News
Chihuahua Stealer
Infection Chain for Chihuahua Stealer

This document contains an embedded PowerShell script that, upon execution, initiates a multi-stage payload chain.

The first stage involves a short launcher that bypasses execution policies by running a Base64-encoded string silently through PowerShell’s iex command.

This setup is designed to evade immediate detection and allows attackers to embed the actual malicious logic in an encoded payload.

Subsequent stages involve fetching additional payloads from fallback command and control (C2) servers.

According to the Report, these payloads are dynamically downloaded and executed, showcasing the modular nature of the attack.

The script uses hex-string obfuscation and scheduled jobs for persistence, checking for custom marker files in the Recent folder and fetching further instructions from domains like cdn.findfakesnake.xyz.

Data Exfiltration and Stealth Techniques

Chihuahua Stealer targets browser data, including login credentials, cookies, autofill information, and browsing history, as well as crypto wallet extensions.

After harvesting this data, it’s compressed into an archive with a “.chihuahua” extension and encrypted using AES-GCM through Windows CNG APIs.

Chihuahua Stealer
Main Program

This encryption method, combined with the use of native Windows functions, adds a layer of complexity to the malware’s detection.

The final stage involves the encrypted data being exfiltrated over HTTPS, with the malware making efforts to erase local traces by clearing the console and clipboard contents.

This method of operation illustrates a deliberate attempt at stealth, ensuring the malware’s activities go unnoticed for as long as possible.

The Chihuahua Stealer’s approach, utilizing Google Drive as an initial infection vector, signifies a growing trend where legitimate services are misused for malicious purposes.

Its use of multi-stage payload delivery, scheduled task persistence, and advanced encryption methods highlights a significant challenge for cybersecurity professionals.

Indicators of Compromise:

TypeIndicator
URLs/IPs– hxxps://flowers[.]hold-me-finger[.]xyz/index2[.]php
– hxxps://cat-watches-site[.]xyz/
– hxxps://cdn.findfakesnake.xyz/
PowerShell Script SHAafa819c9427731d716d4516f2943555f24ef13207f75134986ae0b67a0471b84
Payload SHAc9bc4fdc899e4d82da9dd1f7a08b57ac62fc104f93f2597615b626725e12cae8
File Extension.chihuahua
Detection Signatures– PowerShell.Trojan-Downloader.Agent.IE1KHF
– Win32.Trojan-Stealer.Chihuahua.8W7FOE

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...