Categories: Cyber Security News

Dark Partners Hackers Wipe Crypto Wallets Through Fraudulent AI Tools and VPN Services

A financially driven cybercrime group known as Dark Partners has ramped up global cyber theft operations, orchestrating a wave of sophisticated attacks that target cryptocurrency assets and user credentials through an extensive infrastructure of fraudulent websites.

Since at least May 2025, Dark Partners has impersonated more than three dozen legitimate software brands including leading AI tools, VPN providers, crypto wallets, and widely used applications deploying highly evasive malware campaigns across the US, EU, Russia, Canada, and Australia.

Global Malware Surge Exploits Fake Brands

Industry analysts have observed that Dark Partners leverages over 250 deceptive domains to deliver its malware arsenal: Poseidon Stealer, crafted for macOS, and PayDay Loader, aimed at Windows environments.

The group’s infrastructure is tightly integrated, with centralized management and modular payload deployment handled through a proprietary platform dubbed the PayDay Panel.

Both malware strains are distributed via advanced social engineering tactics, including SEO poisoning and phishing, with the fake websites designed to ensnare users seeking downloads of trusted software or AI services.

Researchers attribute the group’s resilience and operational agility to its adoption of stolen code signing certificates, allowing malicious binaries to bypass common security checks, and a battery of anti-sandboxing techniques that help evade analysis or automated defenses.

On macOS, Poseidon Stealer achieves persistence using launch agents and scheduled tasks, while on Windows, PayDay Loader leverages PowerShell scripts and virtual hard disk images for stealthy, durable implantation.

Both variants exfiltrate a broad range of sensitive information including crypto wallet contents, login credentials, and browser data prioritizing data likely to yield rapid financial returns.

Recent disruptions to Dark Partners’ operations have been temporarily sparked by the invalidation and revocation of key code signing certificates.

However, ongoing monitoring suggests the group has swiftly replenished its capabilities with newly acquired certificates and by further proliferating their portfolio of fraudulent domains.

Sophisticated Tactics

The lack of observed ties to nation-state actors or established APT groups indicates that Dark Partners is motivated by direct financial gain, monetizing stolen data both through theft and cybercriminal market sales.

Defenders face significant challenges given the group’s dynamic toolkit and global targeting strategy.

Security experts recommend a multilayered response: advanced endpoint detection and response (EDR) solutions augmented with behavioral analytics, strict enforcement of certificate validation, and network controls that respond dynamically to new indicators of compromise.

Organizations are advised to closely monitor for suspicious certificate use, anomalous persistence mechanisms such as macOS launch agents or unauthorized PowerShell activity and potential connections to known Dark Partners C2 infrastructure.

Enhanced user awareness is also crucial, as social engineering remains a primary infection vector; targeted training and simulated phishing exercises are essential, especially within cryptocurrency, technology, and financial services sectors.

Looking ahead, threat intelligence analysts warn that Dark Partners is likely to upgrade its evasion capabilities even further, potentially resorting to fileless attack methods, increased abuse of living-off-the-land binaries (LOLBins), and deeper infiltration into emerging DeFi and NFT platforms.

The use of AI-generated content for social engineering poses an additional threat as the group seeks to broaden its attack surface.

Defending against this adaptive threat will demand continuous intelligence sharing, agile detection techniques, and ongoing user security education as core tenets for organizations across crypto-rich and digital asset-dependent industries.

Dark Partners represents an evolving, highly professional cybercrime operation focused on maximum financial gain through the systematic looting of cryptocurrency wallets and user credentials.

Their anticipation of industry defensive measures, coupled with rapid infrastructure updates, signals a continued escalation in both sophistication and reach well into the future.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

The post Dark Partners Hackers Wipe Crypto Wallets Through Fraudulent AI Tools and VPN Services appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Lori Chavez-DeRemer out as secretary of the US Department of Labor

Lori Chavez-DeRemer, at the time a member of the U.S. House from Oregon, speaks to…

2 minutes ago

State oversight board would control Memphis Shelby schools budget, contracts

A joint House-Senate panel approved a measure creating a new state board that will control…

3 minutes ago

Holy Moly, Crusader Kings 3 Will Let You Play as a Pope

Crusader Kings 3 is getting a new core expansion, By God Alone, and it's going…

52 minutes ago

Pokémon TCG Has Two New Ascended Heroes Releases Dropping This Month

April 2026 is turning out to be a mega month in the Pokémon Trading Card…

53 minutes ago

The CyberPowerPC RTX 5070 Gaming PC With 32GB of DDR5 RAM Drops to $1399, Includes Pragmata

Despite the rising prices of graphics cards and DDR5 RAM, there are still good deals…

53 minutes ago

This Piranha Plant Switch 2 Charging Dock Is a Functional Work of Art

There have been a lot of different Switch 2 accessories released since the console itself…

53 minutes ago

This website uses cookies.