Firewall Daily

New Cheana Stealer Threat Targets VPN Users Across Multiple Operating Systems

The Cheana Stealer campaign uses a phishing site that mimics WarpVPN to trick users into downloading malicious VPN apps for various operating systems.

Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging the “Cheana Stealer” malware, which has been distributed via a VPN phishing site. This attack is notable for its targeting of users across various operating systems, including Windows, Linux, and macOS.

The Cheana Stealer campaign has been executed through a phishing site designed to impersonate a legitimate VPN provider. This site, which mimics the appearance of the WarpVPN service, has been specifically engineered to lure individuals to download VPN applications for different operating systems. 

The attackers have crafted distinct binaries of the Cheana Stealer for each targeted OS, showcasing their effort to maximize their reach.

Overview of the Cheana Stealer Campaign

According to Cyble Research and Intelligence Lab (CRIL), the Cheana Stealer malware targets users across multiple operating systems through distinct methods. For Windows, the malware is delivered via a PowerShell script that executes a batch file named install.bat.

Installation instructions for Windows (Source: Cyble)

This script first checks for Python on the victim’s system, and if not found, installs Python along with tools like pip and virtualenv. 

It then installs a malicious Python package called hclockify-win, designed to steal sensitive information. This package targets cryptocurrency browser extensions and standalone wallets, compressing the stolen data into a ZIP file that is sent to the attackers’ command and control (C&C) server. Additionally, it extracts stored browser passwords from Chromium-based browsers and Firefox.

On Linux systems, the Cheana Stealer is distributed through a curl command that downloads a script named install-linux.sh.

Installation instruction for Linux (Source: Cyble)

This script retrieves a unique ID for tracking purposes and collects sensitive information, including browser data, cryptocurrency wallet details, and SSH keys, which are then exfiltrated to the attackers’ server.

For macOS users, the malware is distributed via a script named install.sh.

Install instruction for MacOS (Source: Cyble)

The script deceives users into entering their credentials through fake prompts and then gathers browser login data, macOS passwords, and Keychain information. These details are subsequently sent to the C&C server.

Across all platforms, the Cheana Stealer operates by exploiting system vulnerabilities and user trust to exfiltrate sensitive information, highlighting the need for better security measures.

The Role of the Telegram Channel and Technical Analysis

Telegram Profile Changes (Source: Cyble)

The phishing site associated with the Cheana Stealer campaign is linked to a Telegram channel with over 54,000 subscribers. This channel, active since at least 2018, has undergone several changes in operators, with the phishing site being added to its bio in 2021. The channel has been instrumental in disseminating malicious content and gaining user trust before switching to the distribution of the Cheana Stealer.

The Telegram channel initially offered what appeared to be free VPN services, using this guise to build credibility. Once a user base was established, the channel pivoted to promote the phishing site, exploiting the trust gained to distribute malware.

The Cheana Stealer campaign employs a meticulously crafted technical strategy. The phishing site, posing as WarpVPN, offers detailed yet deceptive installation instructions for various operating systems.

Warpvpn Site in 2021 (Source: Cyble)

These instructions lead users to install malware disguised as legitimate applications.

The malware is customized for Windows, Linux, and macOS, each version designed to extract specific sensitive data. It integrates smoothly into the victim’s system, ensuring effective data collection.

Once collected, the stolen data is archived and sent over HTTPS to the attackers’ server, securing it during transmission and making detection more difficult. This sophisticated approach highlights the need for users to be vigilant and employ robust security measures.

Mitigation Strategies

To protect against phishing attacks like those from the Cheana Stealer campaign, users should follow several key recommendations. First, always download VPN applications and other software from reputable sources to avoid malicious versions. Awareness campaigns can help users recognize phishing attempts and verify the legitimacy of VPN services.

Additionally, deploying advanced endpoint protection solutions can help detect and block malicious scripts. Regular updates to these tools are essential for maintaining their effectiveness. Monitoring network traffic with security tools can prevent communication with known command and control servers, adding another layer of defense. Enabling Multi-Factor Authentication (MFA) provides an extra security layer, reducing the risk of unauthorized access even if credentials are compromised.

Furthermore, having a well-developed incident response plan is crucial. This plan should be regularly updated to address and manage malware infections swiftly. The Cheana Stealer campaign exemplifies a sophisticated phishing attack that exploits user trust by masquerading as a legitimate VPN service.

The use of tailored malware for different operating systems and the strategic use of a Telegram channel underline the campaign’s complexity.

Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Recent Posts

Cyber-Kinetic Warfare Escalates as Iran, US, and Israel Clash Across Military and Digital Fronts

Middle East conflict intensifies as Iran, US, and Israel deploy cyberattacks, missiles, and hacktivist campaigns reshaping regional security.

11 hours ago

Home Routers in Singapore Must Meet Higher Security Standards by 2027

CSA and IMDA will upgrade residential routers to CLS Level 2, enhancing mandatory cybersecurity requirements in Singapore by 2027.

17 hours ago

University of Hawaii Cancer Center Breach Exposes SSNs of 87,000+ Participants

The UH Cancer Center cyberattack exposed decades-old research data at the University of Hawaii, potentially impacting 87,493 study participants.

19 hours ago

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti Connect Secure Devices

The emphasis on critical infrastructure highlights why RESURGE malware is not just another vulnerability exploitation case.

2 days ago

Ring Camera Doorbell Ad Triggers Privacy Concerns and Public Criticism in America

A Super Bowl ad for Ring camera doorbells triggered backlash, exposing growing unease over security cameras and expanding surveillance networks.

2 days ago

Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

This model has become increasingly common across dark web ecosystems, allowing cybercriminals to reach global buyers without maintaining traditional web…

2 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More