A recently identified information stealer named ‘RisePro’ is being distributed by pay-per-install malware downloader service ‘PrivateLoader’, cyberthreat firm Flashpoint reports.
Written in C++, RisePro harvests potentially sensitive information from the compromised machines and then attempts to exfiltrate it as logs.
RisePro was initially spotted on December 13, featured on a cybercrime marketplace called Russian Market, where cybercriminals upload and sell logs exfiltrated using stealers.
According to Flashpoint, the malware appears to be based on Vidar stealer, which has been analyzed several times in the past.
A fork of the Arkei stealer itself, Vidar is known for downloading a series of dependencies and configuration settings from its command-and-control (C&C) server. The infostealer was cracked in 2018 and several clones were seen in the past, including the ‘Oski’ and ‘Mars’ stealers.
RisePro too was seen using dropped dynamic link library (DLL) dependencies that Vidar uses, and the malware’s analysis suggests that it is very likely a clone of Vidar. However, RisePro also shows similarities with other information stealers out there.
Russian Market, Flashpoint says, lists more than 2,000 logs supposedly exfiltrated using RisePro, which may indicate that the information stealer is gaining popularity among cybercriminals.
The cybersecurity firm also notes that RisePro appears to have been distributed by PrivateLoader for the past year.
Pay-per-install services allow threat actors to buy the ability to have their malicious payloads downloaded onto infected systems, and Flashpoint says it has observed advertisements for this type of services on cybercriminal forums and on Telegram, which is typically used by threat actors to provide customer support.
Related: Multi-Purpose Botnet and Infostealer ‘Aurora’ Rising to Fame
Related: New Infostealer Malware ‘Erbium’ Offered as MaaS for Thousands of Dollars
Related: New Ducktail Infostealer Targets Facebook Business Accounts via LinkedIn

More from Ionut Arghire
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
