The M.S. You Didn’t Know About

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I might not be able to magic money into your bank account but subbing to Scriptingthewhy can help keep it there.
Photo by Viniclus Vieira ft, please support by following @pexel.com

Threat actors have been trying to find ways into your wallet and it seems like they might have found the perfect product to do so. It is fairly known that threat actors want what’s in your wallet and they have attempted through numerous means to reap the benefits of your hard labor.

Although this time, they might have found the perfect product to do just that with the dark web market best-seller. We are going to look at what kind of attack this is, who is using it, its functionality and effects upon release, and some ways you could prevent all the precious items in your wallet from mystically disappearing.  

The dark web isn’t as dark as you think, shady business is done in the light too.
Photo by Elti Meshau, please support by following @pexel.com

The Attack

If you are unfamiliar with the dark web, this is the digital underground nightclub for threat actors and others of the like. Here you can link up with like-minded individuals and purchase items anonymously.

Whether it’s legal or not depends on its nature and its intended use. Now with the addition of Mystical Stealer (MS) being the latest malware product on the market, that nightclub just turned up the bass.

No, this isn’t a play on Mac Stealer and it’s more of a problem as you’ll come to find.

I’m cranking up music like rising gas prices.
Photo by Gaby Tenda, please support by following @pexel.com

Who Can It Be Now

While this Digital Underground nightclub is currently popping, hackers are doing the Humpty dance in their victim’s bank accounts. MS is considered to be a malware-as-a-service due to being priced at USD 150 a month with the option of opting for a tri-monthly payment of USD 390. But like with inflation, gas prices, and MSs popularity the creator is looking to raise those price tags. It’s mind-blowing how criminals have a budget in mind for mucking up the budget of others. Never meet your hero kids.

The creator of MS, who still hasn’t been named, is receiving praise for his product. So much so that the creator has opened the floor on forums requesting any suggestions to improve the product. This raises concern because a threat actor is a developing problem but threat actors working together in numbers can be a developing nightmare.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Don’t judge a book by its cover, I’m actually monitoring your network and before you ask, no, I don’t get paid enough for this.
Photo by Tima Miroshnichenko, please support by following @pexel.com

The Sinking Feeling

Speaking of developing nightmares, MS can find its way onto many versions of the Windows OS (Operating System). This ranges from Windows XP to 11 and it doesn’t need any dependencies so tracking its whereabouts is difficult.

MS also checks the environment to ensure it’s not in a sandbox—this is an environment that simulates another computer and other OS can be used within the environment, MS checks for this before it begins its infiltration.

It does this by checking the CPUID, the CPUID is what it sounds like when you break it down. CPU is the Central Processing Unit; ID is the Identification so in a nutshell this malware is checking under the hood to see what you’re running baby. It’s a little checking up the skirt action being done here.

Once in, it begins its operation by inserting itself into the memory to avoid detection and begins to make use of system calls for compromising targets. This is done to ensure that no trace is left on the hard disk during the exfiltration process.

After a target is chosen, malware is released for it to encrypt and transmit. The data is transmitted all the while client authentication is never needed. The malware has the bonus of being created without the need to use third-party libraries and has the enhanced functionality to parser from a self-written browser. It’s almost like the Tesla of malware, except it doesn’t crash on auto-drive.

Malware! We know you’re here!
Photo by Faruk Tokluoglu, please support by following @pexel.com

The Prevention

Now, while threat actors need money, we’re sure you do too. There are some ways to help prevent MS from two-stepping its way into your system. Ensuring your antivirus software is up to date as this will be patched regularly to reduce the risk of infection.

For business owners who have employees. providing awareness training for your employees can help lower the risk of systems becoming infected. Incorporating an incident and response plan as part of your playbook will help as this prepares for an “in case” scenario.

Mystical Stealer has already proven to be a threat so treating it lightly may see things go up in thin air and as times are getting harder, it’s clear that no one wants that.

Prisoner: How’d you know I was going to be there?
Guard: We read a few scripts.
Prisoner: Curse that meddling Scriptingthewhy.
Photo by Ron Lach, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on Mystical Stealer? Script a comment below.