Home Cyber Attack Chrome Password Stealing Trojan Sends Passwords To Remote MongoDB Database

Chrome Password Stealing Trojan Sends Passwords To Remote MongoDB Database

by Abeerah Hashim
Zaraza bot malware steals passwords

Researchers have found a new password stealer targeting Google Chrome. What’s different about this Chrome Password Stealing Trojan is that it stores all stolen passwords to a remote MongoDB database.

Chrome Password Stealing Trojan

Reportedly, researchers have discovered a new password stealing Trojan targeting Google Chrome. Identified as CStealer, the Trojan has nothing special except its peculiar way of storing stolen passwords.

According to BleepingComputer, the malware first caught the attention of MalwareHunterTeam and then of a researcher James.

As discovered, CStealer specifically pilfers stored passwords from the Google Chrome browser. It then transmits the extracted data to a remote MongoDB. This behavior is in contrast with other trojans that compile the stolen information in a file and send it to a C&C server.

Specifically, the Trojan connects to the database via MongoDB C Driver, for which, it also has the credentials. So, right after gaining access to the passwords stored in Chrome Password Manager, it connects to the database to share data.

Risk Of Password Breaches

As observed by the researchers, the Trojan presently works as a password stealer. However, it still poses a significant threat to users’ security since it potentially permits other attackers to steal passwords.

According to Lawrence Abrams,

Anyone analyzing this malware, whether it be law enforcement, researchers, or other threat actors, can retrieve the hard coded credentials and use them to gain access to the stolen credentials.

Therefore, users should avoid saving passwords to their browsers, especially if they use the Chrome browser.  Consider using an alternate password manager, such as LastPass, as it seems the Trojan targets Chrome’s Password Manager.

In addition, make sure to update your passwords frequently so that, in the event of a breach, no one can misuse your credentials.

Let us know your thoughts in the comments.

You may also like