• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Linux security Mac security Windows security

New Mars Stealer malware is distributed via Google Ads and OpenOffice

William Marshal Posted On March 30, 2022
0



Mars Stealer malware

A new information stealing payload called ‘Mars Stealer malware‘ is increasing in popularity and threat analysts have spotted large scale campaigns are employing it. After analyzing it for a while, the Mars Stealer malware is a modified version of Oski malware that has info-stealing capabilities targeting broad spectrum of apps.

The malware is marketed in hacking forums for around $140-$160, and is seeing a decent growth in user counts, as the malware is similar to Racoon malware. And because of the growth this Mars Stealer malware can soon be seen in multiple hacking campaigns says the Threat Analysts at Morphisec Report.

Mars Stealer on a OpenOffice Campaign

As per Morphisec report, a new campaign is already active and is using Google Ads advertising to rank the morphed OpenOffice sites high on Canadian Search Results. OpenOffice is quite popular among the free users and hits a massive download count everyday.

The threat actors have cloned the Mars Stealer malware as the OpenOffice installer with the Babadeda crypter or the Autoit loader so the targeted users will infect themselves by installing the OpenOffice which is the Mars Stealer in disguise.

Data Stolen by Mars Steaker malware

The active campaign distributing the Mars Stealer appears to steal the browser auto-fill data, credit card details, IP address, country code, browser extension details and timezone.

The funny thing about this campaign is that, the hackers mistakenly installed the Mars Stealer on their own system while testing it and this allowed the security researchers to map their GitLab accounts, credentials and Google Ad account details.

Mars Stealer malware
Mars Stealer malware search results for Canada

Mars Stealer threatening cryptocurrency

The operators that use Mars Stealer malware is targeting cryptocurrency assets. The browser plugin called MetaMask, followed by Coinbase Wallet, Math Wallet and Binance Wallet is the most stolen plugin. And the research firm Morphisec also found credentials that belonged to a healthcare infrastructure provider in Canada and has trace of high-profile Canadian service firms.

To keep your network and device safe against Mars Stealer malware, avoid Google Ad links. If you need complete technical details on the malware please find it here at 3xp0rt’s analysis.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends




Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search