{"id":43843,"date":"2026-02-23T00:08:04","date_gmt":"2026-02-22T16:08:04","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/"},"modified":"2026-02-23T00:08:04","modified_gmt":"2026-02-22T16:08:04","slug":"arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/23\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/","title":{"rendered":"Arkanix Stealer pops up as short-lived AI info-stealer experiment"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"897\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/06\/18\/hand.jpg\" width=\"1600\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><\/p>\n<p>An information-stealing malware operation named&nbsp;Arkanix Stealer, promoted on multiple dark web forums towards the end&nbsp;of 2025, was likely developed as an AI-assisted experiment.<\/p>\n<p>The project included a control panel and a Discord server for communication with users, but the author took them down without notification, just two months after the operation began.<\/p>\n<p>Arkanix offered many of the standard data-stealing features that cybercriminals are used to, along with a modular architecture and anti-analysis features.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><\/a> <\/div>\n<p>Kaspersky researchers <a href=\"https:\/\/securelist.com\/arkanix-stealer\/119006\/\" target=\"_blank\" rel=\"nofollow noopener\">analyzed the Arkanix stealer<\/a>&nbsp;and&nbsp;found clues indicating LLM-assisted development, which &#8220;might have drastically reduced development time and costs.&#8221;<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"591\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/LLM.jpg\" width=\"900\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><figcaption><strong>Signs of LLM traces in coding<\/strong><br \/><em>Source: Kaspersky<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The researchers believe that Arkanix was a short-lived project for quick financial gains, which&nbsp;makes detection and tracking much more difficult.<\/p>\n<h3>Arkanix appears online<\/h3>\n<p>Arkanix started being promoted on hacker forums in October 2025, offering two tiers to potential customers: a basic level with a Python-based implementation, and a &ldquo;premium&rdquo; one with a native C++ payload using VMProtect protection, integrating AV evasion&nbsp;and wallet injection features.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"684\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/ad.jpg\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><figcaption><strong>Arkanix promoted on hacker forums<\/strong><br \/><em>Source: Kaspersky<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The developer&nbsp;set up a Discord server that acted as a forum for the community around the project to receive updates, provide feedback for proposed features,&nbsp;and receive help.<\/p>\n<p>Also, a referral program was established to promote the project more aggressively, giving referrers an extra free hour of premium access, while potential new customers received one week of&nbsp;free access to the &ldquo;premium&rdquo; version.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"589\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/refer.jpg\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><figcaption><strong>Referral options from within the dashboard<\/strong><br \/><em>Source: Kaspersky<\/em><\/figcaption><\/figure>\n<\/div>\n<h3>Data-stealing capabilities<\/h3>\n<p>Arkanix malware can collect system information, steal data stored in the browser (history, autofill info, cookies, passwords), and cryptocurrency wallet data from 22 browsers.&nbsp;Kaspersky <a href=\"https:\/\/securelist.com\/arkanix-stealer\/119006\/\" target=\"_blank\" rel=\"nofollow noopener\">researchers say<\/a> that it can also extract 0Auth2 tokens on Chromium-based browsers.<\/p>\n<p>Additionally, the malware can steal data from Telegram, steal Discord credentials, spread via the Discord API, and send messages to the victim&rsquo;s friends\/channels.<\/p>\n<p>Arkanix also targets credentials for Mullvad, NordVPN, ExpressVPN, and ProtonVPN, and can archive files from the local filesystem to exfiltrate them asynchronously.<\/p>\n<p>Additional modules that can be downloaded from the command-and-control include a Chrome grabber, a wallet patcher for Exodus or Atomic, a screenshots tool, HVNC, and stealers for FileZilla and Steam.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"446\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"900\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/extensions.jpg\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><figcaption><strong>Partial list of targeted crypto extensions<\/strong><br \/><em>Source: Kaspersky<\/em><\/figcaption><\/figure>\n<\/div>\n<p>The &ldquo;premium&rdquo; native C++ version adds RDP credential theft, anti-sandbox and anti-debugging checks, WinAPI-powered screen capturing, and also targets Epic Games, Battle.net, Riot, Unreal Engine, Ubisoft Connect, and GOG.<\/p>\n<p>The higher-tier variant also delivers the ChromElevator post-exploitation tool, which injects into suspended browser processes for data theft and is designed to bypass Google&#8217;s App-Bound Encryption (ABE) protection for unauthorized access to user credentials.<\/p>\n<p>The purpose of the Arkanix stealer experiment remains unclear. The project may be an attempt to determine how LLM assistance can improve malware development and how quickly new features can be shipped to the community.<\/p>\n<p>Kaspersky&#8217;s assessment&nbsp;is that Arkanix is &#8220;more of a public software product than a shady stealer.&#8221;<\/p>\n<p>The researchers provide a comprehensive list of indicators of compromise (IoCs) that include hashes&nbsp;for detected files, along with domains and IP addresses.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"Arkanix Stealer pops up as short-lived AI info-stealer experiment\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/infostealer-malware-found-stealing-openclaw-secrets-for-first-time\/\">Infostealer malware found stealing OpenClaw secrets for first time<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-moltbot-skills-used-to-push-password-stealing-malware\/\">Malicious MoltBot skills used to push password-stealing malware<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels\/\">StealC hackers hacked as researchers hijack malware control panels<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions\/\">New GlassWorm attack targets macOS via compromised OpenVSX extensions<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware\/\">New ClickFix attacks abuse Windows App-V scripts to push malware<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>An information-stealing malware operation named&nbsp;Ar [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-43843","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43843"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43843\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}