Check Point Research has published a detailed analysis of a new Malware-as-a-Service (MaaS) offering named ChronoStealer. This modular information stealer is sold on a subscription basis on underground forums, making sophisticated cybercrime tools accessible to a broad audience of low-skilled actors for a low monthly fee. The malware's primary function is to steal saved credentials from dozens of browsers and applications. Its functionality can be extended via optional modules for keylogging, screen capture, and stealing cryptocurrency wallets and session cookies. ChronoStealer uses the Telegram API for command and control (C2) and data exfiltration, a technique that helps it evade network-based detection. The emergence of powerful, easy-to-use MaaS platforms like ChronoStealer significantly lowers the barrier to entry for data theft and poses a growing threat to individuals and organizations.
The MaaS model is a key aspect of this threat. The developers of ChronoStealer are not conducting the attacks themselves; instead, they rent out their malware and infrastructure to other criminals ('subscribers'). This business model allows them to profit while maintaining distance from the direct act of compromise. The subscribers are provided with a web-based control panel to manage their infected machines (bots) and view the stolen data, making the entire operation feel like using a legitimate software product.
ChronoStealer is designed for flexibility and stealth.
T1566.001 - Spearphishing Attachment) or bundled with cracked software on torrent sites (T1195.002 - Compromise Software Supply Chain).T1055 - Process Injection).T1555.003 - Credentials from Web Browsers).T1102.002 - Bidirectional Communication).The proliferation of MaaS platforms like ChronoStealer democratizes cybercrime. It enables individuals with minimal technical skill to launch effective data theft campaigns against a large number of targets. For organizations, this increases the volume and variety of threats they face. A single employee falling victim to a phishing email can lead to the compromise of their corporate credentials, which can then be used for network intrusion, business email compromise (BEC) attacks, or sold to other criminals. For individuals, an infection can lead to the theft of banking credentials, social media accounts, and cryptocurrency, resulting in financial loss and identity theft.
Security teams should monitor for the following indicators:
| Type | Value | Description | Context |
|---|---|---|---|
network_traffic_pattern |
Outbound network traffic to api.telegram.org from unexpected processes. |
ChronoStealer uses the Telegram API for C2. Legitimate Telegram clients are one thing, but other processes making these connections are highly suspicious. | EDR network logs, Firewall/Proxy logs |
process_name |
lsass.exe |
Info-stealers often attempt to access the memory of the LSASS process to dump credentials. | EDR logs, Windows Security Event Logs |
file_name |
*.zip, *.rar |
Phishing campaigns distributing ChronoStealer often use malicious attachments inside archives to evade email scanners. | Email gateway logs, endpoint file creation logs |
api.telegram.org from any process that is not the official Telegram desktop client. This can be an effective way to disrupt the malware's C2 channel. D3FEND Technique: Outbound Traffic Filtering (D3-OTF).Modern EDRs can detect the behavioral patterns of info-stealers, such as accessing browser credential stores or LSASS memory.
Mapped D3FEND Techniques:
Filtering egress traffic can block the malware's C2 communication, especially to known services like Telegram's API.
Mapped D3FEND Techniques:
Training users to spot and report phishing is a key defense against the primary delivery vector.
To counter ChronoStealer's use of the Telegram API for C2, organizations should implement strict egress filtering policies. On corporate firewalls and web proxies, create a rule to block or, at a minimum, alert on all connections to api.telegram.org. An exception can be made for specific source IPs if the official Telegram client is a sanctioned business application, but for most corporate environments, traffic to this endpoint from servers or general workstations is highly anomalous. This filtering disrupts the malware's ability to exfiltrate stolen data and receive commands, effectively neutralizing it post-infection and providing a clear signal to incident responders that a host is compromised.
Deploy and enable modern endpoint protection features designed to prevent credential theft. For Windows environments, this includes enabling Attack Surface Reduction (ASR) rules, specifically the rule 'Block credential stealing from the Windows local security authority subsystem (lsass.exe)'. This can prevent info-stealers like ChronoStealer from dumping credentials from memory. Additionally, enabling Windows Defender Credential Guard uses virtualization-based security to isolate the LSASS process, making it significantly harder for malware to access. These platform-native hardening measures provide a robust defense against a wide range of credential theft malware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats