Categories: Cyber Security News

Dark Partners Hackers Wipe Crypto Wallets Through Fraudulent AI Tools and VPN Services

A financially driven cybercrime group known as Dark Partners has ramped up global cyber theft operations, orchestrating a wave of sophisticated attacks that target cryptocurrency assets and user credentials through an extensive infrastructure of fraudulent websites.

Since at least May 2025, Dark Partners has impersonated more than three dozen legitimate software brands including leading AI tools, VPN providers, crypto wallets, and widely used applications deploying highly evasive malware campaigns across the US, EU, Russia, Canada, and Australia.

Sponsored
class="wp-block-heading">Global Malware Surge Exploits Fake Brands

Industry analysts have observed that Dark Partners leverages over 250 deceptive domains to deliver its malware arsenal: Poseidon Stealer, crafted for macOS, and PayDay Loader, aimed at Windows environments.

The group’s infrastructure is tightly integrated, with centralized management and modular payload deployment handled through a proprietary platform dubbed the PayDay Panel.

Both malware strains are distributed via advanced social engineering tactics, including SEO poisoning and phishing, with the fake websites designed to ensnare users seeking downloads of trusted software or AI services.

Researchers attribute the group’s resilience and operational agility to its adoption of stolen code signing certificates, allowing malicious binaries to bypass common security checks, and a battery of anti-sandboxing techniques that help evade analysis or automated defenses.

On macOS, Poseidon Stealer achieves persistence using launch agents and scheduled tasks, while on Windows, PayDay Loader leverages PowerShell scripts and virtual hard disk images for stealthy, durable implantation.

Both variants exfiltrate a broad range of sensitive information including crypto wallet contents, login credentials, and browser data prioritizing data likely to yield rapid financial returns.

Recent disruptions to Dark Partners’ operations have been temporarily sparked by the invalidation and revocation of key code signing certificates.

However, ongoing monitoring suggests the group has swiftly replenished its capabilities with newly acquired certificates and by further proliferating their portfolio of fraudulent domains.

Sophisticated Tactics

The lack of observed ties to nation-state actors or established APT groups indicates that Dark Partners is motivated by direct financial gain, monetizing stolen data both through theft and cybercriminal market sales.

Defenders face significant challenges given the group’s dynamic toolkit and global targeting strategy.

Sponsored

Security experts recommend a multilayered response: advanced endpoint detection and response (EDR) solutions augmented with behavioral analytics, strict enforcement of certificate validation, and network controls that respond dynamically to new indicators of compromise.

Organizations are advised to closely monitor for suspicious certificate use, anomalous persistence mechanisms such as macOS launch agents or unauthorized PowerShell activity and potential connections to known Dark Partners C2 infrastructure.

Enhanced user awareness is also crucial, as social engineering remains a primary infection vector; targeted training and simulated phishing exercises are essential, especially within cryptocurrency, technology, and financial services sectors.

Looking ahead, threat intelligence analysts warn that Dark Partners is likely to upgrade its evasion capabilities even further, potentially resorting to fileless attack methods, increased abuse of living-off-the-land binaries (LOLBins), and deeper infiltration into emerging DeFi and NFT platforms.

The use of AI-generated content for social engineering poses an additional threat as the group seeks to broaden its attack surface.

Defending against this adaptive threat will demand continuous intelligence sharing, agile detection techniques, and ongoing user security education as core tenets for organizations across crypto-rich and digital asset-dependent industries.

Dark Partners represents an evolving, highly professional cybercrime operation focused on maximum financial gain through the systematic looting of cryptocurrency wallets and user credentials.

Their anticipation of industry defensive measures, coupled with rapid infrastructure updates, signals a continued escalation in both sophistication and reach well into the future.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

The post Dark Partners Hackers Wipe Crypto Wallets Through Fraudulent AI Tools and VPN Services appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

TA453 and TA473 Drive Iran War-Themed Phishing Across The Middle East

The conflict around Iran is now shaping cyber espionage across the region. Since the start…

22 minutes ago

Authorities Shut Down Malicious Proxy Network Used to Spread Malware

A coordinated international law enforcement operation has dismantled a large malicious proxy service known as…

22 minutes ago

PowerShell and PsExec Used To Steal Data Before INC Ransomware Attack

Cybersecurity researchers at Huntress recently observed threat actors deploying INC ransomware following a sophisticated data…

23 minutes ago

Handala Expands Destructive Cyber Operations Beyond Israeli Targets

A rising wave of destructive wiper attacks is currently threatening organizations across the United States…

23 minutes ago

Multi-Stage Remcos RAT Campaign Hides Behind JavaScript and PowerShell

A new fileless malware campaign is showing how cybercriminals are changing their methods to stay…

23 minutes ago

Ninja’s star Creami ice cream maker is on sale for $169

Ninja’s Creami 5‑in‑1 Ice Cream lets you make everything from sorbet to smoothie bowls. |…

28 minutes ago

This website uses cookies.