Cyber Security NewsTechnologie

Remus-Infostealer stiehlt Browser-Passwörter und umgeht Verschlüsselung von Anwendungen

Ein gefährliches neues Malware-Programm namens Remus ist aufgetaucht und nimmt dort an, wo einer der gefürchtetsten Informationsdiebe aufgehört hat.

6. Mai 2026Tushar Subhra DuttaLive Redaktion
Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass

Kurzfassung

Warum das wichtig ist

Cyber Security NewsTechnologie
  • Ein gefährliches neues Malware-Programm namens Remus ist aufgetaucht und nimmt dort an, wo einer der gefürchtetsten Informationsdiebe aufgehört hat.
  • A dangerous new piece of malware called Remus has surfaced, quietly picking up where one of the most feared information stealers left off.
  • Designed to steal browser passwords, cookies, and cryptocurrency wallets, Remus carries the DNA of Lumma Stealer, one of the most technically advanced stealers-as-a-service seen in recent history.

Remus first appeared in the wild around January and February 2026, arriving shortly after Lumma Stealer suffered a major disruption. Between late August and October 2025, alleged core members behind Lumma were exposed through a doxxing campaign that rattled the group’s operations. Researchers believe some of Lumma’s authors split off or chose to rebuild under a new name, and Remus appears to be the result.

Analysts at Gen Threat Labs identified this new threat, tracing its roots to test builds labeled as Tenzor. Dated September 16, 2025, those builds served as a bridge between Lumma and what would become Remus. Researchers Vojtech Krejsa and Jan Rubin attributed Remus as a new 64-bit variant of the Lumma family, noting that Lumma was originally a 32-bit operation.

What makes Remus especially concerning is how closely it mirrors Lumma in design and behavior. The two the same string obfuscation method, anti-virtual machine checks, nearly identical code structure, and a browser encryption bypass that researchers had only ever seen Lumma use. This level of overlap points strongly to a shared origin. While Lumma campaigns continue globally, Remus is not a direct replacement.

Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass
Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass

It is more of a natural

It is more of a natural evolution, upgrading the architecture to 64-bit and adding newer evasion techniques. Both threats represent a widening footprint for an actor that has already proven very hard to stop. Lumma-Style Browser Key Theft One of Remus’s most alarming inherited capabilities is its method for breaking into browser-protected data.

It targets Application-Bound Encryption, a security layer Chromium browsers use to protect sensitive keys stored on disk. Rather than reading the key off disk, Remus injects a small shellcode into the live browser process to locate and decrypt the master key from inside the browser’s own memory.

Remus decrypting the hex pattern used in the ABE bypass (Source – GenDigital) This technique had previously only been observed in Lumma Stealer. Remus searches for a specific byte pattern inside the browser’s code, locates the encrypted key in memory, and uses the browser’s own decryption functions to unlock it. The shellcode Remus injects is more compact at 51 bytes versus Lumma’s 62, suggesting active refinement.

Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass
Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass

If injection into an existing browser

If injection into an existing browser process fails, Remus launches a hidden browser on a separate desktop, invisible to the user. Unlike Lumma, which used a hardcoded desktop name, Remus generates a random 16-character string each time. This makes detection harder for tools that rely on fixed naming patterns.

EtherHiding and Anti-Analysis Evasion Beyond encryption bypass, Remus introduces a key upgrade in how it contacts its command-and-control servers. Lumma relied on platforms like Steam and Telegram to store server addresses. Remus replaces this with EtherHiding, embedding the server address inside an Ethereum blockchain smart contract, making its infrastructure far harder to disrupt.

Remus resolving a C2 using EtherHiding (Source – GenDigital) Because blockchain data is decentralized and cannot be removed, there is no single point of failure for defenders to target. Remus queries the smart contract at runtime over a public endpoint and pulls the current server address, removing a defensive lever that had worked against Lumma.

Remus also adds checks to detect analysis tools and sandbox environments before executing. It scans for DLLs linked to known analysis platforms and checks for a specific honeypot file on disk. If either check triggers, the malware exits silently. These capabilities make Remus a stealthier and more sophisticated threat that security teams need to address without delay. on

Quellenprofil

Quelle und redaktionelle Angaben

Quelle
Cyber Security News
Originaltitel
Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass
Canonical
https://cybersecuritynews.com/remus-infostealer-uses-lumma-style-browser-key-theft/
Quell-URL
https://cybersecuritynews.com/remus-infostealer-uses-lumma-style-browser-key-theft/

Aehnliche Inhalte

Verwandte Themen und interne Verlinkung

Weitere Artikel aus aehnlichen Themenfeldern, damit Leser direkt im selben Kontext weiterlesen koennen.

Apple Intelligence: Nutzer wählen künftig das KI-Modell für iOS 27
Im FokusTechnologie

Apple Intelligence: Nutzer wählen künftig das KI-Modell für iOS 27

Apple plant mit iOS 27, Nutzern die Wahl des KI-Modells zu geben, das Apple Intelligence antreibt. Durch das neue Feature „Extensions“ können externe Modelle wie Googles Gemini und Anthropic's Claude systemweit auf iPhones, iPads und Macs integriert werden.

06.05.2026

Live Redaktion