A suspected developer behind a newly identified malware strain, known as Styx Stealer, made a significant operational security (OpSec) mistake, inadvertently leaking sensitive data from his own computer. This error has provided cybersecurity researchers with valuable insights into the developer’s clients and earnings.
Styx Stealer is described as a potent piece of malware, capable of extracting data from web browsers, hijacking instant messenger sessions on platforms like Telegram and Discord, and even targeting cryptocurrency assets. The Israel-based cybersecurity firm Check Point, which conducted a detailed analysis of the malware, reported that it had been deployed against its customers, though specific details were withheld.
Researchers from Check Point revealed in a report released last week that the developer’s critical error allowed them to capture a substantial amount of intelligence. The data leak exposed links between the developer of Styx Stealer and a known threat actor associated with the Agent Tesla malware, identified as FucosReal. Agent Tesla, a notorious remote access Trojan (RAT) that has been targeting Windows systems since 2014, has been involved in various spam campaigns, including one aimed at Check Point’s clientele.
The developer’s OpSec failure occurred when he inadvertently revealed his personal information while debugging Styx Stealer on his own machine. The debugging process, which involved a Telegram bot token provided by a customer participating in the Agent Tesla campaign, exposed the developer’s Telegram accounts, email addresses, and contacts. This misstep not only compromised the anonymity of Styx Stealer’s creator but also provided valuable intelligence on other cybercriminal activities, including the origins of the Agent Tesla operation.
Further investigation led researchers to connect Styx Stealer to a Turkish hacker operating under the alias Sty1x. This connection ultimately enabled Check Point to trace FucosReal to an individual located in Nigeria.
“The case of Styx Stealer serves as a powerful reminder that even the most sophisticated cybercriminal operations can falter due to basic security oversights,” noted the researchers.
