Categories: Cyber Security News

Threat Actors Advertising Anivia Stealer Malware on Dark Web bypassing UAC Controls

A sophisticated information-stealing malware named Anivia Stealer has emerged on underground forums, marketed by a threat actor known as ZeroTrace.

The malware represents a dangerous evolution in credential theft operations, specifically designed to compromise Windows systems from legacy XP installations through the latest Windows 11 environments.

Built using C++17, Anivia Stealer incorporates advanced evasion techniques and comprehensive data exfiltration capabilities that pose significant risks to individual users and enterprise networks alike.

The malware’s advertising campaign highlights its ability to bypass User Account Control mechanisms through automatic elevation techniques, allowing it to execute privileged operations without triggering security warnings that typically alert users to suspicious activity.

KrakenLabs researchers identified the threat actor’s promotional efforts across cybercriminal marketplaces, where Anivia Stealer is being offered on a subscription model ranging from €120 for one month to €680 for lifetime access.

Analysis reveals that the stealer targets an extensive range of sensitive information including browser credentials, authentication cookies, cryptocurrency wallets, messaging tokens, Local Security Authority credentials, and system screenshots.

The malware maintains encrypted communication channels with its command-and-control infrastructure and features automatic update capabilities to evade detection signatures.

https://twitter.com/KrakenLabs_Team/status/1983117117089096080?ref_src=twsrc%5Etfw

Threat intelligence suggests that Anivia Stealer may represent a rebrand or fork of the previously identified ZeroTrace Stealer, with GitHub commit history and developer metadata linking both projects to the same malicious actor who has also distributed Raven Stealer.

UAC Bypass and Privilege Escalation Mechanisms

The core functionality enabling Anivia Stealer’s effectiveness lies in its User Account Control bypass implementation.

The malware exploits Windows privilege escalation vectors to achieve automatic elevation without user interaction, effectively neutralizing one of the operating system’s primary security boundaries.

This technique allows the stealer to access protected system areas, registry hives containing cached credentials, and memory spaces holding authentication secrets that would normally require administrative approval.

The malware’s claim of requiring no external dependencies suggests it packages all necessary exploitation code within its binary, reducing forensic artifacts and simplifying deployment across diverse target environments while complicating detection efforts by security solutions.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Threat Actors Advertising Anivia Stealer Malware on Dark Web bypassing UAC Controls appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

RondoDox Botnet Grows To 174 Exploits With Large-Scale Residential IP Abuse

According to industry reports, the number of connected Internet of Things (IoT) devices reached 16.6…

41 minutes ago

Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped

Medical technology giant Stryker Corporation confirmed on March 11, 2026, that it suffered a significant…

1 hour ago

Nearly 4,000 Workers Strike at One of the Largest Meatpacking Plants in the United States

GREELEY, Colo. (AP) — Thousands of workers for the world’s largest meatpacking company began a…

1 hour ago

Aviation-focused Daniel Webster College to be remembered 60 years after its founding

One of the state’s most unusual colleges, the aviation-heavy Daniel Webster College that lasted next…

1 hour ago

‘I like giving joy to people’: Warner woodworker carves a new welcome sign for Exit 8

Curled wood shavings sprinkled across Jim McLaughlin’s workspace, filling the cabin connected to the garage…

1 hour ago

Loudon repeals arcane law that sends taxes and students to Concord schools

For more than 150 years, a small band of Loudon property owners who live along…

1 hour ago

This website uses cookies.