Meduza Stealer: New Windows Infostealer Targets Sensitive Data with Advanced Evasion Techniques

Interestingly, Meduza Stealer exhibits self-termination in certain countries, including those within the Commonwealth of Independent States (CIS) and Turkmenistan. This geographical specificity suggests a deliberate effort to avoid scrutiny and potential legal repercussions in specific jurisdictions. By limiting its operation to select regions, the malware’s creators attempt to remain under the radar of law enforcement and cybersecurity agencies.

In addition to browser-related data, Meduza Stealer also targets Windows Registry entries and a list of installed games on the victim’s system, indicating its wide-ranging objectives in extracting valuable information. The malware provides the threat actor with a web panel interface that displays the stolen data and offers functionalities to download or delete the acquired information.

Uptycs researchers highlight the extensive feature set of Meduza Stealer, showcasing its creators’ sophistication and determination to ensure the malware’s success. The existence of such advanced malware underscores the constant evolution and adaptation of cyber threats, necessitating robust security measures and proactive defense strategies.