New SantaStealer Malware Goes After Your Passwords and Cryptocurrencies
NEWNow you can listen to News articles!
Christmas is around the corner and so is the SantaStealer malware. While the name sounds cheerful, this malware is more than capable of ruining your holiday happiness. The worst part is that this new strain is available to almost anyone who is willing to pay a small fee. Basically, it works as malware as a service, allowing buyers to target people on a large scale, obviously without any legitimate use.
SantaStealer is starting to make noise on Telegram channels and underground hacker forums. It is being marketed as a stealthy memory information thief that can silently siphon data without leaving obvious traces on the disk.
Memory only does not mean undetectable. It simply reduces disk artifacts, which can delay detection rather than prevent it entirely. That promise alone is enough to attract cybercriminals, especially at a time when browser-stored passwords, session cookies, and crypto wallets remain high-value targets.
MALICIOUS BROWSER EXTENSIONS AFFECT 4.3M USERS
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered right to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free when you join me CYBERGUY.COM information sheet.

The SantaStealer malware is spreading ahead of Christmas, with cybercriminals marketing the data theft tool for rent on Telegram and underground forums. (Kurt “CyberGuy” Knutsson)
SantaStealer and how it really works
SantaStealer operates as a malware-as-a-service, charging $175 per month for its basic level and $300 per month for the premium plan. Rapid7 researchers say the operation renames a previous project called BluelineStealer, and a Russian-speaking developer is pushing for a broader release before the end of the year.
Despite bold claims about evading detection, Rapid7’s analysis paints a more substantiated picture. The samples they examined were not particularly difficult to analyze and lacked the advanced anti-analysis techniques that are advertised, which is good news for us. If it can be detected, security tools have a better chance of removing it before it can cause serious damage.
Functionally, SantaStealer is still dangerous. It uses 14 separate data collection modules running in parallel, extracting information from browsers, messaging apps like Telegram and Discord, gaming platforms like Steam, crypto wallet apps and extensions, and even local documents. The malware can also take screenshots of your desktop. The stolen data is written to memory, compressed into ZIP files, and sent in 10 MB chunks to an encrypted command and control server.
One notable capability is the use of an embedded executable to bypass Chrome’s app-linked encryption, a security feature introduced in mid-2024. This solution typically requires malware to run at the user level and is not a remote omission from Chrome’s security model. Other data thieves have already used similar tricks, demonstrating how quickly attackers test and adapt to new browser protections.
What this says about the current threat landscape
SantaStealer is not yet fully operational and has not been widely distributed, but it reflects a broader trend in cybercrime. Modern information stealers are modular, configurable, and sold much like regular software. The affiliate panel Rapid7 observed allows buyers to fine-tune exactly what data the malware steals, from full system sweeps to attacks specifically targeting specific apps or crypto wallets.
The malware also includes options to avoid infecting systems in certain regions and delay execution, which can baffle both victims and security analysts. As for how SantaStealer might spread, researchers say recent campaigns are increasingly relying on ClickFix-style attacks. These tricks push victims to paste malicious commands directly into the Windows terminal, often disguised as steps to fix a problem or enable a feature.
More traditional methods are still in play. Phishing emails, pirated software, torrent downloads, malicious ads, and even misleading YouTube comments remain effective distribution channels. Once malware like this is executed on a system, it takes very little time to obtain saved passwords, session cookies and wallet data which can then be abused or sold.
7 steps you can take to stay safe from SantaStealer malware
A few sensible habits and the right tools can significantly reduce risk, even as malware like this continues to evolve. Here are seven practical steps you can take to stay safe:
1) Use powerful antivirus software
Modern antivirus tools don’t just look for known malware signatures. They also monitor suspicious behavior, such as programs that try to capture browser data or run hidden processes. Keep real-time protection enabled and take alerts seriously instead of dismissing them.
The best way to protect yourself from malicious links that install malware and potentially access your private information is to have powerful antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best antivirus protection winners of 2025 for your Windows, Mac, Android, and iOS devices at Cyberguy.com.

A new malware-as-a-service threat known as SantaStealer targets passwords, session cookies, and crypto wallets while promoting itself as a stealth attack that only affects memory. (Thomas Trutschel/Photothek via Getty Images)
2) Keep your operating system and applications updated
Updates aren’t just about new features. They often fix security flaws that are actively attacked by malware. This includes your operating system, browser, browser extensions, crypto wallet applications, and messaging tools. Delaying updates gives attackers a wider window to exploit known weaknesses.
3) Switch to a password manager
Data thieves love browser-saved passwords because they’re easy to obtain. A password manager stores your credentials in an encrypted vault and reduces what your browser saves locally. It also helps you use unique and strong passwords for each service without having to remember them.
Next, check to see if your email has been exposed in previous breaches. Our #1 pick for password manager includes a built-in breach scanner that checks to see if your email address or passwords have appeared in known breaches. If you discover a match, immediately change any reused passwords and protect those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK
4) Enable two-factor authentication whenever possible
Even if your password is stolen, 2FA can prevent attackers from entering. App-based authenticators are more secure than SMS codes and should be your first choice for email, crypto exchanges, cloud services, and social media accounts.
5) Be very careful with commands and “quick fixes”
ClickFix-style attacks are based on trust and urgency. If a website, pop-up, or video tells you to paste a command into the Windows terminal to fix something, stop. Unless you fully understand what that command does, assume it is dangerous.
6) Use a personal data deletion service
When your email, phone number, or other personal data is widely available online, attackers can target you more convincingly. Personal data removal services help remove your information from data broker sites, reducing the chances of spear phishing or malware lures.
While no service can guarantee complete removal of your data from the Internet, a data deletion service is truly a smart choice. They are not cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically deleting your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to delete your personal data from the Internet. By limiting the information available, you reduce the risk of scammers cross-referencing leak data with information they can find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already available on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already available on the web: Cyberguy.com.
HACKERS PUSH FAKE APPS WITH MALWARE IN GOOGLE SEARCHES
7) Avoid pirated software and unverified extensions
Cracked software, torrents, and suspicious browser extensions remain some of the most reliable malware distribution methods. They often include information stealers that run silently in the background. Stick to official app stores, trusted developers, and verified extensions, even if it means skipping a “free” download.

SantaStealer can silently siphon sensitive data. (Kurt “CyberGuy” Knutsson)
Kurt’s Key Takeaway
SantaStealer may not live up to its expectations yet, but that shouldn’t make you complacent. Malware in its early stages often improves quickly once developers fix obvious bugs. Be wary of links and attachments from unknown emails and think twice before running unverified code or browser extensions pulled from public repositories.
When was the last time you checked which extensions have access to your data? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE News APP
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered right to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free of charge. is if you join me CYBERGUY.COM information sheet.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning technology journalist with a deep love for technology, gear and gadgets that improve lives with his contributions to News and News Business since mornings on “News & Friends.” Do you have any technical questions? Get Kurt’s free CyberGuy newsletter, share your voice, a story idea or comment on CyberGuy.com.


