New 'Storm' Infostealer Bypasses Endpoint Detection via Server-Side Decryption

New 'Storm' Infostealer Bypasses Endpoint Detection via Server-Side Decryption

A new infostealer dubbed ‘Storm’ has surfaced in underground cybercrime forums, marking a significant evolution in credential theft tactics. According to Cyber Threat Intelligence, this malware offers a compelling package for less than $1,000 per month, allowing operators to exfiltrate browser credentials, session cookies, and cryptocurrency wallet data. Unlike older stealers that performed decryption locally on the victim’s machine – a process often flagged by endpoint security solutions – Storm sends encrypted data directly to the attacker’s servers for decryption.

This shift is a direct response to improvements in endpoint security and changes like Google’s App-Bound Encryption in Chrome. Previous bypass methods, such as injecting code into browsers or abusing debugging protocols, still left detectable traces. Storm circumvents this by moving the decryption process server-side, effectively disappearing from the compromised endpoint’s telemetry. Cyber Threat Intelligence notes that Storm supports both Chromium and Gecko-based browsers, a broader scope than some predecessors.

The data Storm collects is comprehensive, including saved passwords, session cookies, autofill information, Google account tokens, credit card details, and browsing history. This trove of information provides attackers with everything needed to hijack active user sessions remotely, bypass multi-factor authentication, and gain unauthorized access to sensitive accounts and services without needing to crack passwords directly.

What This Means For You

  • If your organization relies on browser-based authentication or stores sensitive information in employee browsers, you need to understand this attack vector. Review your endpoint detection and response (EDR) capabilities to ensure they can detect exfiltration of encrypted data or unusual network traffic patterns. Consider implementing stricter policies around session management and credential storage, and educate users on the risks of clicking suspicious links or downloading unknown files that could lead to infostealer deployment.
🔎
Track Storm infostealer and related threats Use /actor Storm to see related threat intelligence.
Open Intel Bot →

Related Posts

JanaWare Ransomware: Turkish Citizens in the Crosshairs

The cybercriminal landscape is a constantly shifting beast, and new ransomware strains are always emerging. According to The Record by Recorded Future, a new player...

threat-inteldata-breachgovernmentmalwareransomwareidentity
/MEDIUM

Microsoft Patches SharePoint Zero-Day, 160 Vulnerabilities

Microsoft's latest Patch Tuesday was a big one, addressing a staggering 161 vulnerabilities. According to SecurityWeek, this makes it the second-largest Patch Tuesday ever, based...

threat-intelvulnerabilitymicrosoft
/MEDIUM

Microsoft Drops Windows 10 Extended Security Update

Microsoft has rolled out the Windows 10 KB5082200 extended security update, a critical patch addressing vulnerabilities initially slated for the April 2026 Patch Tuesday. According...

threat-inteldata-breachmalwarevulnerabilitymicrosofttools
/HIGH