Researchers from Malwarebytes have identified a malware campaign distributing an info-stealer known as Needle Stealer. The campaign uses a fake website, tradingclaw[.]pro, which promotes a non-existent AI-powered trading tool called "TradingClaw." Victims interested in financial trading tools are lured into downloading a ZIP file that contains the malware. Needle Stealer is designed to exfiltrate a wide range of sensitive information, with a focus on browser data, active login sessions, and cryptocurrency wallets. The campaign employs techniques like DLL hijacking to evade detection and appears to be part of a broader operation, with the same stealer being distributed by other malware loaders like Amadey and GCleaner.
The campaign targets individuals interested in cryptocurrency and financial trading, a demographic likely to have valuable digital assets. The tradingclaw[.]pro website acts as the initial lure, using social engineering to convince users to download and execute the malicious payload. The website exhibits evasive behavior, sometimes redirecting users to different sites to avoid analysis.
Once executed, Needle Stealer begins harvesting data from the infected device. Its primary targets are:
The stolen data is exfiltrated to a command-and-control (C2) server. The C2 panel includes functionality to generate fake login pages, suggesting the attackers plan to use the stolen data for further, more targeted phishing attacks.
The infection chain demonstrates several evasion techniques:
T1204.001 - Malicious Link).T1574.001 - DLL Search Order Hijacking) to load the malicious payload. This involves placing a malicious DLL in a location where a legitimate, trusted application will load and execute it, making the activity appear benign.T1555 - Credentials from Password Stores and T1552.001 - Credentials In Files.chrocustumapp[.]com and google-services[.]cc.Victims of Needle Stealer face a high risk of significant financial loss and privacy invasion.
tradingclaw[.]prochrocustumapp[.]comchrocustomreversal[.]comgoogle-services[.]cccoretest[.]digitalreisen[.]workSecurity teams can hunt for signs of info-stealer activity:
C:\Users\<user>\AppData\Local\Temp.D3-UA - URL Analysis can be used to block the initial lure website..exe file from a document.Educate users about the risks of downloading software from untrusted websites and social media promotions.
Use a modern endpoint security solution that can detect and block known info-stealers and their behaviors.
Mapped D3FEND Techniques:
Use DNS filtering or a web proxy to block access to known malicious domains, including the C2 servers used by Needle Stealer.
Mapped D3FEND Techniques:
A highly effective and scalable defense against campaigns like the one distributing Needle Stealer is DNS Denylisting, often implemented as DNS filtering. Security teams should subscribe to reputable threat intelligence feeds and ingest the list of known malicious domains (like tradingclaw[.]pro and the various C2 domains) into their DNS resolver or web proxy. When a user clicks the malicious link or the malware attempts to contact its C2 server, the DNS request is blocked at the network level, preventing the initial download or the subsequent data exfiltration. This network-based control protects all devices on the network without requiring software on each endpoint and is crucial for breaking the attack chain early.
To detect the Needle Stealer payload itself, organizations should leverage endpoint security solutions capable of analyzing file content. This goes beyond simple hash-based detection. Security teams can create YARA rules that look for specific strings or code patterns characteristic of Needle Stealer and other info-stealers. For example, a rule could search for the combination of strings related to accessing Chrome's 'Login Data' database, functions for decrypting AES-encrypted credentials, and code for accessing cryptocurrency wallet browser extensions. When a file is downloaded or created, the endpoint agent scans it against these rules. A match would trigger a high-confidence alert and quarantine the file, preventing execution and stopping the threat before any data is stolen.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats