WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Broken Clouds Humidity: 89%
Wind: 1.54 M/S

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

DarkCloud Cyber Campaign Targets Spanish Critical Sectors 

A sophisticated cyberattack leveraging the DarkCloud information stealer has been targeting Spanish organizations across technology, legal, financial, and government sectors since early April 2025. 

Attack Methodology 

The malware is distributed through phishing emails containing weaponized .TAR archives disguised as billing-related documents. This marks a significant escalation in DarkCloud’s activity, as attackers refine their techniques to bypass traditional security defenses. 

The attack begins with emails titled “Importe: 3.500,00 EUR”, containing a malicious .TAR file (Importe3.50000EUR_Transfer.tar). Once extracted, the archive deploys a DarkCloud binary that steals: 

  • Login credentials 
  • Cryptocurrency wallets 
  • Sensitive documents 

Advanced Capabilities 

Analysts at Broadcom identified the campaign’s use of social engineering, impersonating a legitimate Spanish skiing equipment vendor to deceive victims. 

DarkCloud’s capabilities align with advanced commodity stealers, enabling it to: 

  • Extract browser credentials from Chrome, Opera, and Yandex 
  • Monitor clipboard activity 
  • Hijack cryptocurrency wallet addresses (Bitcoin, Ethereum) 

Its modular design allows selective data exfiltration via SMTP, FTP, and Telegram APIs, while its anti-analysis features make it harder to detect and reverse-engineer. 

Infection Chain & Execution Flow 

The malware follows a multi-stage deployment strategy: 

.TAR Archive – Contains an obfuscated executable that drops: 

  • A configuration file specifying exfiltration endpoints 
  • A DLL file that handles credential theft 
  • A watchdog process that ensures persistence 

Anti-Analysis Evasion – DarkCloud employs sandbox detection using system fingerprinting: 

if (CheckVmRegKeys() || CheckDebuggerPresent()) { ExitProcess(0); } 

If a virtual machine or debugger is detected, the malware terminates itself to evade security analysis. 

Data Theft & Exfiltration – The stealer: 

  • Modifies registry settings for persistence 
  • Searches for .pdf, .xlsx, and cryptocurrency wallet files 
  • Compresses stolen data into password-protected .ZIP files 
  • Transmits the stolen information to attackers' servers 

Detection & Mitigation 

Security firms, including Symantec, have identified DarkCloud’s payload using machine learning models (Heur.AdvML.B) and signature-based detection (Trojan.Gen.MBT). However, the attack highlights the growing need for stronger email security. 

Organizations should: 
Block .TAR files from unknown senders 
Enhance phishing awareness training 
Use endpoint protection tools to detect obfuscated malware 
Monitor network traffic for unauthorized data transfers 

With DarkCloud continuing to evolve, proactive email security and advanced threat detection remain critical in mitigating future attacks. 

Found this article interesting? Follow us on X(Twitter)  and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.