Categories: Cyber Security News

Threat Actors Evolve GIFTEDCROOK Stealer into an Advanced Intelligence-Gathering Tool

The cyber-espionage landscape in Eastern Europe has witnessed a significant escalation with the rapid evolution of the GIFTEDCROOK infostealer, attributed to the threat group UAC-0226. 

Originally identified as a rudimentary browser credential stealer, GIFTEDCROOK has undergone a series of technical upgrades since its inception in early 2025, transforming into a sophisticated intelligence-gathering tool. 

This development coincides with heightened geopolitical events, notably the Ukraine-Russia negotiations in Istanbul, suggesting a deliberate alignment of cyber operations with strategic diplomatic milestones.

Technical Evolution

Initial samples of GIFTEDCROOK, detected in February 2025, functioned primarily as proof-of-concept malware, exfiltrating browser data to attacker-controlled Telegram channels

By March, the malware entered active deployment, with subsequent versions (v1.2 and v1.3) introducing advanced features such as encrypted document theft, selective file targeting based on extension and modification date, and enhanced anti-analysis techniques. 

The latest variant, v1.3, is capable of harvesting a broad array of sensitive files including proprietary documents and OpenVPN configurations while maintaining persistent access to compromised systems.

The primary infection vector remains spear-phishing, leveraging highly credible military-themed PDF lures.

Malicious PDF attachment

According to Arctic Wolf Labs Report, these phishing emails often spoofed from Ukrainian-controlled cities like Uzhhorod, are crafted to exploit the urgency of administrative fines or military mobilization. 

Upon opening the malicious attachment, victims are redirected to weaponized cloud-hosted files (typically on Mega.nz), which subsequently deploy OLE-laden Excel documents. 

Portable executable (PE) extraction from OLE file.

These documents employ social engineering tactics, such as instructing users to enable macros under the guise of correcting font errors, thereby triggering the execution of the GIFTEDCROOK payload.

Data Exfiltration

Once executed, GIFTEDCROOK systematically searches for files matching specific extensions (.doc, .pdf, .ovpn, among others) and browser secrets across Chrome, Edge, and Firefox. 

The malware compresses and encrypts the collected data, exfiltrating it via Telegram bot APIs to attacker-controlled channels. 

Notably, the malware’s infrastructure overlaps with other campaigns utilizing commercial Remote Access Trojans (RATs) such as NetSupport, indicating a coordinated, multi-pronged approach to intelligence collection against Ukrainian governmental and military targets.

Technical analysis reveals the use of weak Sender Policy Framework (SPF) settings in phishing emails, facilitating spoofing and complicating attribution. 

The malware also employs batch scripts for self-deletion, minimizing forensic footprints post-exfiltration.

The evolution of GIFTEDCROOK underscores a shift from opportunistic credential theft to targeted intelligence operations supporting broader geopolitical objectives. 

The campaign’s timing coinciding with Ukraine’s martial law extensions and critical negotiation periods highlights the threat actor’s intent to inform military and diplomatic decision-making processes.

Defensive recommendations include the deployment of Secure Email Gateways, Endpoint Detection and Response (EDR) solutions, and comprehensive security awareness training to counter social engineering. 

Organizations are urged to monitor for anomalous Telegram API communications, suspicious file paths, and the distinctive file search patterns characteristic of GIFTEDCROOK.

Indicators of Compromise (IOC)

Type Indicator / Value Description / Version
SHA-256 a6dd44c4b7a9785525e7f487c064995dc5f33522dad8252d8637f6a6deef3013 GIFTEDCROOK v1.2 PE implant
SHA-256 b9d508d12d2b758091fb596fa8b8b4a1c638b7b8c11e08a1058d49673f93147d GIFTEDCROOK v1.3 PE implant
SHA-256 1974709f9af31380f055f86040ef90c71c68ceb2e14825509babf902b50a1a4b Malicious PDF lure
SHA-256 f6b03fa3ea7fd2c4490af19b3331f7ad384640083757a3cede320ca54c7b0999 Malicious .xlsm OLE document
Telegram API URL hxxps://api[.]telegram[.]org/bot7806388607:AAFb6nCE21n6YmK6-bJA6IrcLTLfhlwQ254/sendDocument Exfiltration channel v1.2
Telegram API URL hxxps://api[.]telegram[.]org/bot7726014631:AAFe9jhCMsSZ2bL7ck35PP30TwN6Gc3nzG8/sendDocument Exfiltration channel v1.3
File Path %ProgramData%InfomasterInfomaster GIFTEDCROOK v1.2 implant path
File Path %ProgramData%PhoneInfoPhoneInfo GIFTEDCROOK v1.3 implant path
Temp Directory C:Users%Username%AppDataLocalTempa−zA−Z0−9]13a-zA-Z0-9]{13}a−zA−Z0−9]13a-zA-Z0-9]{13} Temporary storage for exfiltrated data

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Threat Actors Evolve GIFTEDCROOK Stealer into an Advanced Intelligence-Gathering Tool appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Spacelift Unleashes Infrastructure Teams From DevOps Gridlock

Spacelift has launched Spacelift Intelligence to help infrastructure teams escape drowning in provisioning requests. Developers…

36 minutes ago

Reco Tackles AI Agent Chaos With SaaS Security

Reco has released Reco AI Agent Security to fill the visibility gap for AI agents…

36 minutes ago

Sana from Workday launches AI Superintelligence to streamline business

Workday has announced a major evolution of its business platform, with the first update to…

36 minutes ago

Van Weelde Sets Sail with Unit4 ERPx Upgrade

Unit4 has announced that Van Weelde Shipping Group is one of the latest customers to…

36 minutes ago

Are We ‘Data Ready’ for AI or any Meaningful Process Transformation?

AI in all its forms (analytical, generative, agentic, et al) promises to redefine how work…

36 minutes ago

Xbox Will Finally Let You Disable Quick Resume for Specific Games, Such as Online Titles That It Just Doesn’t Play Nice With

Microsoft has announced a fresh set of system features, including the long-requested ability to disable…

36 minutes ago

This website uses cookies.