Categories: NewsSecurity

Ovidiy Stealer Malware Targets Windows Users Despite Glaring Issues

A new malware, known as Ovidiy Stealer, is making the rounds on Russian websites. This particular tool is quite cheap for criminals to purchase. The price is around $10. Unfortunately, it is not the best type of info-stealing malware either, which explains the lower price point.

Ovidiy Stealer can be an Annoyance

As is the case with any type of malware designed to steal information from people’s devices, Ovidiy Stealer can prove to be a real pain in the neck. It appears this particular tool is often spread through executable files for the Windows operating system. It pops up in some fake cryptocurrency wallets, games, and hacked software versions. So far, it does not appear any cryptocurrency users have had their wallet information stolen.

Ovidiy Stealer can be purchased from a Russian darknet marketplace for as little as $7, although prices may vary depending on the RUB/USD exchange rate. At most, people will pay just $13 for it. However, you get what you pay for, and a cheap tool will not result in people making millions of dollars overnight. It takes a fair amount of work to infect people with this malware in the first place.

Criminals purchasing this particular tool often embed it in executable files distributed through peer-to-peer protocols such as torrents.Several filenames have been identified already, which appear to relate to Litebitcoin, VK Hack Tool, World of Tanks, and a TeamSpeak update. This list will grow a lot longer as more time progresses. Spreading hacked paid software is always a great way of distributing malware and that trend will not change anytime soon.

Related Post

It also appears criminals distributing Ovidiy are trying to get more people infected through dedicated spam email campaigns. Spreading a malware-laden executable as an email attachment to people all over the world certainly has a lot of potential to succeed. There is no evidence to show this particular tool has been even remotely successful, even though its list of features -limited as it is- should not be written off by any means.

Ovidiy Stealer can obtain data from programs such as FileZilla, Google Chrome, Opera, and a few other browsers. That in itself is quite disturbing since a lot of people spend their entire online life in a browser these days. Knowing someone may snoop on your information and harvest login credentials is worrying. It is expected antivirus solutions will release an update to thwart this malware.

There are some downsides to this malware as well. The control panel for all “customers’ is hosted on the same domain hosting the Ovidiy Stealer itself. Paying for this malware can only be done through RoboKassa, the Russian version of PayPal.  Last but not least, rebooting your device will eliminate Ovidiy Stealer as a threat. A rather glaring list of shortcomings which make this malware more of an annoyance rather than a legitimate threat.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

SkyAI’s Explosive 20x Surge Raises Red Flags As On-Chain Data Points To Possible Market Manipulation

The cryptocurrency market is in the crosshairs once again, an explosive price move in SkyAI…

5 hours ago

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

19 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

2 days ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

2 days ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

3 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

4 days ago