{"id":229205,"date":"2026-01-17T02:16:39","date_gmt":"2026-01-17T08:16:39","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2026\/01\/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels"},"modified":"2026-01-17T02:16:39","modified_gmt":"2026-01-17T08:16:39","slug":"stealc-hackers-hacked-as-researchers-hijack-malware-control-panels","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2026\/01\/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels","title":{"rendered":"StealC hackers hacked as researchers hijack malware control panels"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/stealc-hackers-hacked-as-researchers-hijack-malware-control-panels.jpg\"><\/a><\/p>\n<p>A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers\u2019 hardware.<\/p>\n<p>StealC <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-stealc-malware-emerges-with-a-wide-set-of-stealing-capabilities\/\" target=\"_blank\" rel=\"nofollow noopener\">emerged in early 2023<\/a> with aggressive promotion on dark web cybercrime channels. It grew in popularity due to its evasion and extensive data theft capabilities.<\/p>\n<p>In the following years, StealC\u2019s developer added multiple enhancements. With the release of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools\/\" target=\"_blank\" rel=\"nofollow noopener\">version 2.0 last April<\/a>, the malware author introduced Telegram bot support for real-time alerts and a new builder that could generate StealC builds based on templates and custom data theft rules.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cross-site scripting (XSS) flaw in the web-based control panel used by operators of the StealC info-stealing malware allowed researchers to observe active sessions and gather intelligence on the attackers\u2019 hardware. StealC emerged in early 2023 with aggressive promotion on dark web cybercrime channels. It grew in popularity due to its evasion and extensive data [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418,6],"tags":[],"class_list":["post-229205","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/229205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=229205"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/229205\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=229205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=229205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=229205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}