Security researchers at ThreatFabric have identified a significant evolution of the CopperSteal information-stealing malware. The new version (V2) has been specifically re-engineered to target and steal credentials from major cloud service providers, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. Delivered via trojanized software, the malware actively scans infected systems for CLI configuration files and browser session data to harvest API keys and access tokens. The stolen credentials are then sold on dark web forums, providing threat actors with a direct pathway into sensitive corporate cloud environments. This shift in targeting from personal accounts to high-value enterprise cloud infrastructure represents a critical threat to organizations, potentially leading to widespread data breaches and follow-on attacks.
The evolution of CopperSteal demonstrates a clear trend of malware authors adapting to modern enterprise IT. By targeting cloud credentials, attackers bypass traditional perimeter defenses and gain direct access to an organization's most critical data and infrastructure.
The malware operates in a series of calculated steps:
T1189 - Drive-by Compromise): The primary delivery vector is through trojanized software downloaded from untrustworthy sources. Developers and IT administrators are key targets, as they are more likely to download tools and have valuable credentials stored on their machines.T1552.005 - Cloud Credentials): This is the core function of CopperSteal V2. It has dedicated modules that scan for:~/.aws/credentials for AWS and ~/.azure/azureProfile.json for Azure.T1560 - Archive Collected Data): The stolen credentials and cookies are collected and often compressed into an archive.T1041 - Exfiltrate Data Over C2 Channel): The data is sent to an attacker-controlled command-and-control (C2) server via an encrypted channel to avoid detection by network monitoring tools.The theft of cloud credentials can be catastrophic:
T1496 - Resource Hijacking), leading to enormous bills..aws or .azure directories. Create rules to detect the execution of known trojanized software.Protecting against infostealers like CopperSteal requires a focus on endpoint and identity security:
M1033 - Limit Software Installation): Prevent users, especially developers, from downloading and installing software from untrusted sources. Use application allowlisting to enforce this.Prevent users from installing unvetted software from the internet, which is a primary delivery mechanism for infostealers.
Avoid using long-lived static credentials. Use IAM roles and temporary tokens for cloud access to minimize the impact of credential theft.
Use modern EDR solutions to detect and block malware like CopperSteal based on its behavior.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats