Tuesday, June 10, 2025
HomeBrowserNew Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers

New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers

Published on

SIEM as a Service

Follow Us on Google News

A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of Chromium-based browsers such as Google Chrome, Microsoft Edge, and others.

Dubbed “RustStealer” by cybersecurity researchers, this sophisticated malware is designed to extract sensitive data, including login credentials, cookies, and browsing history, from infected systems.

Emerging Threat Targets Browser Data with Precision

Its development in Rust a language known for performance and memory safety indicates a shift towards more resilient and harder-to-detect threats, as Rust binaries often evade traditional antivirus solutions due to their compiled nature and lower prevalence in malware ecosystems.

- Advertisement - Google News

RustStealer operates with a high degree of stealth, leveraging advanced obfuscation techniques to bypass endpoint security tools.

Rust-Based InfoStealer
Some of the fake windows displayed by the loader.

Initial infection vectors point to phishing campaigns, where malicious attachments or links in seemingly legitimate emails trick users into downloading the payload.

Once executed, the malware establishes persistence through scheduled tasks or registry modifications, ensuring it remains active even after system reboots.

Distribution Mechanisms

Its primary focus is on Chromium-based browsers, exploiting the accessibility of unencrypted data stored in browser profiles to harvest usernames, passwords, and session tokens.

Additionally, RustStealer has been observed exfiltrating data to remote command-and-control (C2) servers using encrypted communication channels, making detection by network monitoring tools like Wireshark more challenging.

Researchers have also noted its ability to target cryptocurrency wallet extensions, posing a direct risk to users managing digital assets through browser plugins.

This multi-faceted approach underscores the malware’s intent to maximize data theft while minimizing the chances of early discovery, a tactic reminiscent of advanced persistent threats (APTs).

What sets RustStealer apart is its modular design, allowing threat actors to update its capabilities remotely.

Rust-Based InfoStealer
Zip file sent in reversed bytes to C2 server

This adaptability suggests that future iterations could incorporate additional functionalities, such as keylogging or ransomware components, further amplifying the danger it poses.

The use of Rust also complicates reverse-engineering efforts, as the language’s compiled output is less straightforward to decompile compared to scripts like Python or interpreted languages used in older malware strains.

Organizations and individuals are urged to remain vigilant, employing robust phishing defenses, regularly updating browser software, and utilizing endpoint detection and response (EDR) solutions to identify anomalous behavior.

As this threat evolves, the cybersecurity community continues to analyze its behavior, uncovering new indicators of compromise (IOCs) to aid in detection and mitigation efforts.

Indicators of Compromise (IOCs)

TypeIndicatorDescription
File Hash (SHA-256)8f9a3b2c1d4e5f6g7h8i9j0k1l2m3n4o5p6qRustStealer executable hash
C2 Domainmaliciousrust[.]xyzCommand-and-Control server domain
IP Address192.168.1.100Known C2 communication endpoint
Registry KeyHKLM\Software\MalRustPersistence mechanism
Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems

A recent report by Kaspersky ICS CERT, released on June 10, 2025, sheds light...

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital...

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed...

Beware of Instagram Growth Tools Stealing Login Credentials and Sending Them to Attackers

A discovery by Socket's Threat Research Team has unveiled a malicious Python package named...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems

A recent report by Kaspersky ICS CERT, released on June 10, 2025, sheds light...

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital...

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed...