Cyble Research and Intelligence Labs (CRIL) detected a newfound Malware-as-a-Service (MaaS) “Cinoshi” that allows criminals to launch cyberattacks without technical know-how. The Malware-as-a-Service is also packed with other capabilities including a stealer to target browser data.
“Cinoshi Project is a free stealer with support for many additional features and a convenient web panel with a builder. Stiller (stealer), botnet, and clipper in one build, without unnecessary movements and headaches…,” stated the post on the cybercrime forum.
A scammer would need to download Cinoshi Malware-as-a-Service to use it on these platforms that offer tutorials on how to access it.
According to the report, Cinoshi can cause large-scale malware attacks targeting businesses, enterprises, and individuals and effectively infect and disrupt critical infrastructure.
Among its capabilities, besides stealing system data, the Cinoshi Malware-as-a-Service can release different malware families on systems.
Its inbuilt botnet can execute given commands and take screenshots on the device. While the clipper in the Cinoshi MaaS can be added to launch at system startup and used to change nine crypto wallet addresses among others.
Cost of Cinoshi Malware-as-a-Service
Cinoshi Malware-as-a-Service developers are selling it for 1000 Rubles, the Russian Federation currency for a monthly subscription. The cryptominer is being sold at a lifetime subscription of 2000 Rubles or 30 dollars.
An additional 300 Rubles is being charged for an encryption build in the payload. Otherwise, it generates the payload without obfuscation. However, the cybercrime post did mention that if the build is scanned in VirusTotal, it may get detected.
The Cinoshi Malware-as-a-Service web panel description
The cybercrime forum endorsed the Cinoshi MaaS web panel that allowed configuring crypto miners, setting wallets in the clipper, task management for bots, configuring the stealer, managing Telegram notifications, etc.
The Cinoshi stealer can access browser data including passwords and card information from Chromium, Edge, and Gecko.
The stealer is configured to not execute in Commonwealth of Independent States (CIS) countries. Some CIS countries include Russian, Kazakhstan, America, and Moldova. It shows the careful selection of target countries and the exclusion of the same.
The clipper can be used to access crypto addresses including Bitcoin, Ethereum, Litecoin, Neocoin, Dashcoin, Monero, Stellar, Bitcoin Cash, Ripple, etc.