Fake 'TradingClaw' Website Spreads 'Needle Stealer' Malware

Fake 'TradingClaw' AI Trading Tool Website Used as Lure to Distribute 'Needle Stealer' Malware

MEDIUM
April 22, 2026
5m read
MalwarePhishingData Breach

Related Entities

Organizations

Other

Needle StealerAmadeyGCleaner

Full Report

Executive Summary

Researchers from Malwarebytes have identified a malware campaign distributing an info-stealer known as Needle Stealer. The campaign uses a fake website, tradingclaw[.]pro, which promotes a non-existent AI-powered trading tool called "TradingClaw." Victims interested in financial trading tools are lured into downloading a ZIP file that contains the malware. Needle Stealer is designed to exfiltrate a wide range of sensitive information, with a focus on browser data, active login sessions, and cryptocurrency wallets. The campaign employs techniques like DLL hijacking to evade detection and appears to be part of a broader operation, with the same stealer being distributed by other malware loaders like Amadey and GCleaner.

Threat Overview

The campaign targets individuals interested in cryptocurrency and financial trading, a demographic likely to have valuable digital assets. The tradingclaw[.]pro website acts as the initial lure, using social engineering to convince users to download and execute the malicious payload. The website exhibits evasive behavior, sometimes redirecting users to different sites to avoid analysis.

Once executed, Needle Stealer begins harvesting data from the infected device. Its primary targets are:

  • Browser Data: Cookies, saved passwords, and browsing history from popular web browsers.
  • Login Sessions: Hijacking active sessions to gain access to online accounts without needing credentials.
  • Cryptocurrency Wallets: Searching for wallet files and browser extensions related to cryptocurrency.

The stolen data is exfiltrated to a command-and-control (C2) server. The C2 panel includes functionality to generate fake login pages, suggesting the attackers plan to use the stolen data for further, more targeted phishing attacks.

Technical Analysis

The infection chain demonstrates several evasion techniques:

  1. Social Engineering Lure: A professionally designed website promoting a fake but plausible tool (T1204.001 - Malicious Link).
  2. Payload Delivery: The malware is delivered as a ZIP file, a common method to bypass email gateways.
  3. DLL Hijacking: The initial executable uses DLL hijacking (T1574.001 - DLL Search Order Hijacking) to load the malicious payload. This involves placing a malicious DLL in a location where a legitimate, trusted application will load and execute it, making the activity appear benign.
  4. Credential Theft: The core functionality of the malware is to steal credentials from various sources, particularly web browsers and crypto wallets, mapping to T1555 - Credentials from Password Stores and T1552.001 - Credentials In Files.
  5. Exfiltration: Stolen data is sent to attacker-controlled C2 servers like chrocustumapp[.]com and google-services[.]cc.

Impact Assessment

Victims of Needle Stealer face a high risk of significant financial loss and privacy invasion.

  • Financial Theft: The theft of cryptocurrency wallet data can lead to the immediate and irreversible loss of funds.
  • Account Takeover: Stolen browser sessions and saved passwords can allow attackers to take over email, social media, and financial accounts.
  • Identity Theft: The combination of stolen data can be used to commit identity fraud.
  • Further Attacks: The victim's compromised accounts can be used to launch attacks against their contacts.

IOCs — Directly from Articles

Type
Domain
Value
tradingclaw[.]pro
Description
Malicious website used as a lure.
Type
Domain
Value
chrocustumapp[.]com
Description
C2 domain.
Type
Domain
Value
chrocustomreversal[.]com
Description
C2 domain.
Type
Domain
Value
google-services[.]cc
Description
C2 domain.
Type
Domain
Value
coretest[.]digital
Description
C2 domain.
Type
Domain
Value
reisen[.]work
Description
C2 domain.

Cyber Observables — Hunting Hints

Security teams can hunt for signs of info-stealer activity:

Type
Network Traffic Pattern
Value
Outbound connections to known malicious domains/IPs from the IOC list.
Description
Blocking these at the firewall/proxy is a key defense.
Type
Process Activity
Value
An unsigned process making network connections and reading files in browser profile directories.
Description
Stealers need to access local files where browsers store data.
Type
File Monitoring
Value
Creation of temporary ZIP or log files in C:\Users\<user>\AppData\Local\Temp.
Description
Stealers often stage stolen data in a temporary archive before exfiltration.

Detection & Response

  • Detection: Use endpoint security solutions with behavioral detection to identify processes accessing sensitive browser files. Network monitoring with DNS filtering and web proxy logs can block and detect connections to known malicious C2 domains. D3FEND's D3-UA - URL Analysis can be used to block the initial lure website.
  • Response: If an infection is detected, immediately isolate the machine from the network. The user must assume all credentials stored on or entered from that machine are compromised. All passwords should be changed from a clean device, and all active sessions for online accounts should be terminated. If cryptocurrency wallets were present, any remaining funds should be moved to a new, secure wallet immediately.

Mitigation

  1. User Education: Train users to be skeptical of software advertised on social media or untrusted websites. Emphasize the danger of downloading and running executables from unknown sources.
  2. Endpoint Security: Use a reputable endpoint security solution that can detect and block known malware and suspicious behaviors.
  3. Attack Surface Reduction: Use browser settings or extensions to block malicious scripts and ads. Configure Windows to show file extensions by default, so users can distinguish a .exe file from a document.
  4. Credential Management: Encourage the use of password managers, which can help mitigate the impact of stolen browser credentials. Use hardware wallets for storing significant amounts of cryptocurrency, as they are not vulnerable to this type of stealer malware.

Timeline of Events

1
April 22, 2026
This article was published

MITRE ATT&CK Mitigations

Educate users about the risks of downloading software from untrusted websites and social media promotions.

Use a modern endpoint security solution that can detect and block known info-stealers and their behaviors.

Mapped D3FEND Techniques:

Use DNS filtering or a web proxy to block access to known malicious domains, including the C2 servers used by Needle Stealer.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

A highly effective and scalable defense against campaigns like the one distributing Needle Stealer is DNS Denylisting, often implemented as DNS filtering. Security teams should subscribe to reputable threat intelligence feeds and ingest the list of known malicious domains (like tradingclaw[.]pro and the various C2 domains) into their DNS resolver or web proxy. When a user clicks the malicious link or the malware attempts to contact its C2 server, the DNS request is blocked at the network level, preventing the initial download or the subsequent data exfiltration. This network-based control protects all devices on the network without requiring software on each endpoint and is crucial for breaking the attack chain early.

To detect the Needle Stealer payload itself, organizations should leverage endpoint security solutions capable of analyzing file content. This goes beyond simple hash-based detection. Security teams can create YARA rules that look for specific strings or code patterns characteristic of Needle Stealer and other info-stealers. For example, a rule could search for the combination of strings related to accessing Chrome's 'Login Data' database, functions for decrypting AES-encrypted credentials, and code for accessing cryptocurrency wallet browser extensions. When a file is downloaded or created, the endpoint agent scans it against these rules. A match would trigger a high-confidence alert and quarantine the file, preventing execution and stopping the threat before any data is stolen.

Sources & References

Fake TradingClaw site pushes Needle Stealer malware to swipe crypto wallets
BleepingComputer (bleepingcomputer.com) April 22, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MalwareInfoStealerNeedle StealerCryptocurrencyPhishingMalwarebytes

📢 Share This Article

Help others stay informed about cybersecurity threats