Built For & By Cyber Security Professionals
HomeMerger & AcquisitionArkanix Stealer: The Short-Lived AI-Powered Infostealer Experiment
Arkanix Stealer – AI-Powered Infostealer Malware-as-a-Service

Arkanix Stealer: The Short-Lived AI-Powered Infostealer Experiment

Spread the word

n late 2025, cybersecurity researchers uncovered Arkanix Stealer, a new entrant in the Malware-as-a-Service (MaaS) ecosystem. Marketed as an AI-powered infostealer, Arkanix combined traditional credential theft with aggressive marketing tactics and experimental development patterns. Despite its short lifespan, the campaign highlights how cybercriminals are increasingly leveraging artificial intelligence hype to attract buyers and lower development costs.

Technical Breakdown

1. Malware Architecture

  • Languages: Written in C++ and Python, offering flexibility and modularity.
  • Loader: Distributed via phishing-themed executables and cracked software installers.
  • Control Panel: Allowed attackers to configure payloads, track infections, and manage stolen data.
  • Infrastructure: Domains like arkanix[.]pw and arkanix[.]ru hosted the panel before being taken down.

2. Data Theft Capabilities

Arkanix targeted a wide range of sensitive information:

  • System Information: OS details, hardware specs, installed software, antivirus, VPN profiles.
  • Browsers: Passwords, cookies, autofill data, OAuth tokens.
  • Cryptocurrency Wallets: Exodus, Atomic, MetaMask, Binance.
  • Messaging Apps: Telegram session hijacking, Discord credential theft with self-spreading features.
  • VPN Accounts: NordVPN, ProtonVPN, ExpressVPN, Mullvad.
  • Files: Targeted sensitive documents using keywords like motdepasse, banque, secret.

3. Advanced Features

  • ChromElevator: Privilege escalation tool for browser data extraction.
  • Anti-analysis: Sandbox evasion, obfuscation, and packing (PyInstaller, Nuitka).
  • Encryption: AES-GCM with PBKDF2 for secure exfiltration of stolen data.

Distribution & Marketing

Arkanix was aggressively marketed across underground forums and Discord servers:

  • Referral Program: Referrers earned free premium hours; invitees received 7-day trials.
  • Premium Features: Native C++ stealer, wallet injection, priority support.
  • Surveys & Engagement: Developers polled buyers on desired features like Discord injection.
  • AI Angle: Evidence suggests LLM-assisted development, reducing coding time and costs.

Security Implications

1. AI Hype in Malware

Arkanix demonstrates how attackers exploit buzzwords like AI to attract buyers, even when actual AI integration is minimal.

2. Rapid Evolution of MaaS

The campaign shows how quickly MaaS models evolve, lowering the barrier for entry into cybercrime.

3. Defensive Measures

  • Monitor for loaders disguised as installers.
  • Enforce strict endpoint detection and response (EDR).
  • Educate users about risks of downloading cracked software.

Recommended Actions

  • Patch immediately: Upgrade to the fixed versions listed above.
  • Audit permissions: Ensure only trusted users have content editing rights.
  • Enable security monitoring: Use tools like Drupal’s Security Review module or external WAF solutions.
  • Stay updated: Subscribe to Drupal Security Advisories for real-time alerts.

Timeline

  • October 2025: Arkanix advertised on forums.
  • November 2025: Active campaigns observed, targeting browsers, wallets, and messaging apps.
  • December 2025: Infrastructure dismantled; Discord server shut down.
  • 2026: Researchers confirm campaign was short-lived, likely experimental.

Indicators of Compromise

Python loader

MD5 208fa7e01f72a50334f3d7607f6b82bf
File name discord_nitro_code_validator_right_aligned.py

 

Native version of stealer

MD5 a3fc46332dcd0a95e336f6927bae8bb7
File name ArkanixStealer.exe

 

Post-exploitation browser data extractor

MD5 3283f8c54a3ddf0bc0d4111cc1f950c0
File name

Infrastructure

Domain IP First seen ASN
arkanix[.]pw 195.246.231[.]60 Oct 09, 2025
arkanix[.]ru 172.67.186[.]193 Oct 19, 2025

File hashes
752e3eb5a9c295ee285205fb39b67fc4
c1e4be64f80bc019651f84ef852dfa6c
a8eeda4ae7db3357ed2ee0d94b963eff
c0c04df98b7d1ca9e8c08dd1ffbdd16b
88487ab7a666081721e1dd1999fb9fb2
d42ba771541893eb047a0e835bd4f84e
5f71b83ca752cb128b67dbb1832205a4
208fa7e01f72a50334f3d7607f6b82bf
e27edcdeb44522a9036f5e4cd23f1f0c
ea50282fa1269836a7e87eddb10f95f7
643696a052ea1963e24cfb0531169477
f5765930205719c2ac9d2e26c3b03d8d
576de7a075637122f47d02d4288e3dd6
7888eb4f51413d9382e2b992b667d9f5
3283f8c54a3ddf0bc0d4111cc1f950c0

 

Other payloads

Module name Endpoint to download Details
Chrome grabber /api/chrome-grabber-template/{payload_id}
Wallet patcher /api/wallet-patcher/{payload_id} Checks whether “Exodus” and “Atomic” cryptocurrency wallets are installed
Extra collector /api/extra-collector/{payload_id} Uses a set of options from the config, such as collect_filezilla, collect_vpn_data, collect_steam, and collect_screenshots
HVNC /hvnc Is saved to the Startup directory (%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\hvnc.py) to execute upon system boot

Conclusion

Although Arkanix Stealer was short-lived, it represents a growing trend in cybercrime: AI-assisted malware development and aggressive MaaS marketing. Defenders must remain vigilant against experimental campaigns that may disappear quickly but leave lasting damage.

Follow Us On – X.comTelegram, LinkedIN, Discord Server,

 

For The Latest Updates, Vulnerability Insights, Security News, Cyberattack Scoops And Cybersecurity Best Practices Delivered Straight To Your Inbox – Subscribe To Our Newsletter