Threat Advisories:
Hive Pro recognized in Gartner® Magic Quadrant™ for Exposure Assessment Platform, 2025 Watch platform in action

Apple WebKit Zero-Days Exploited in the Wild

Red | Vulnerability Report
Download PDF

Summary

SantaStealer is an emerging Malware-as-a-Service information-stealing malware actively advertised across Telegram and Russian-speaking hacker forums, representing a rebranded evolution of the earlier BluelineStealer project discovered in early December 2025. Built with a modular, multi-threaded architecture, SantaStealer malware targets sensitive documents, credentials, cryptocurrency wallets, and data from popular applications such as Telegram, Discord, and Steam, while attempting to operate entirely in memory to evade traditional file-based detection systems. The SantaStealer infostealer is being marketed as “fully undetected” through aggressive promotional campaigns on underground forums, yet current samples analyzed by security researchers remain largely unobfuscated, exposing symbol names and plaintext strings that make malware analysis and detection relatively straightforward. Offered under a subscription-based Malware-as-a-Service model ranging from $175 to $300 per month, SantaStealer clearly reflects commercial ambitions and potential for broader adoption as the malware continues to mature. The SantaStealer MaaS platform targets worldwide victims with explicit exclusion of Commonwealth of Independent States regions, following typical Russian cybercriminal operational patterns. Despite bold claims of advanced stealth capabilities, SantaStealer samples are delivered as DLL files with unusually large export tables containing over 500 clearly named symbols tied to credential theft and anti-analysis logic, making reverse engineering straightforward for security researchers. The malware’s core functionality focuses on stealing browser credentials, cookies, stored passwords, cryptocurrency wallet data, and application tokens from Telegram, Discord, and Steam accounts. Collected data is sent to command-and-control servers over plain HTTP in compressed chunks, representing a surprisingly weak exfiltration design that undercuts its marketing narrative of advanced operational security.

Attack Details

SantaStealer Emergence and Marketing Strategy

SantaStealer is a newly emerging Malware-as-a-Service infostealer that surfaced in late 2025, previously promoted under the name BluelineStealer across underground cybercriminal marketplaces. The malware is being actively advertised across Telegram channels and Russian-speaking hacker forums with bold claims of advanced stealth capabilities and “fully undetected” operation by endpoint security solutions. In practice, SantaStealer malware focuses on stealing credentials, sensitive documents, and application data while running largely in memory to limit its on-disk forensic footprint. Collected data is sent to command-and-control servers over plain HTTP in compressed chunks, a surprisingly weak design choice that significantly undercuts its marketing narrative of advanced operational security and stealth.

Technical Architecture and Implementation Flaws

In December 2025, security researchers identified Windows samples closely resembling commodity infostealers from the Raccoon malware family. The 64-bit SantaStealer payload was delivered as a DLL file with an unusually large export table containing more than 500 clearly named symbols tied to credential theft and anti-analysis logic. Alongside numerous unencrypted strings embedded in the malware binary, this implementation made reverse engineering straightforward and allowed security analysts to quickly separate marketing hype from technical reality. The decision to ship SantaStealer as a DLL ultimately worked against its developers, as exporting nearly every function and global variable exposed the malware’s internal architecture, configuration handling, and statically linked third-party libraries such as cJSON, miniz, and sqlite3.

Operational Security Failures and Attribution

Embedded branding within SantaStealer samples, including a “SANTA STEALER” banner and Telegram contact link, led security researchers directly to a web-based control panel advertising MaaS features and subscription pricing. Despite claims of high-profile targeting capabilities, forum activity and infrastructure analysis strongly point to Russian-speaking operators with weak operational security practices and prematurely leaked malware builds. The SantaStealer developers’ failure to properly obfuscate their malware represents a significant operational security failure that enables straightforward detection and analysis by security teams.

Functional Capabilities and Data Theft Operations

Functionally, SantaStealer employs a modular, multi-threaded design optimized for comprehensive data exfiltration. Its main routine performs basic environment checks, including Commonwealth of Independent States keyboard detection and simple anti-virtual machine techniques common in Russian malware. The core stealer component targets browser credentials, authentication cookies, and stored passwords, using an auxiliary in-memory component to bypass Chromium browser protections. This method closely mirrors the publicly available ChromElevator project, suggesting code reuse rather than original malware development. Additional SantaStealer modules collect screenshots and extract data from popular applications such as Telegram messaging, Discord communications, and Steam gaming platform before bundling everything into a single compressed archive for exfiltration to command-and-control infrastructure.

Assessment of Malware Maturity

Overall, SantaStealer is best described as an evolving but technically immature infostealer malware. While its fileless, in-memory operational approach aligns with current malware development trends, its stealth and anti-analysis features remain basic compared to established information stealers. Detection is aided by plaintext configurations and hard-coded command-and-control details present in analyzed samples. Despite being marketed as “production-ready” Malware-as-a-Service, SantaStealer remains more notable for its commercial ambition than its technical execution, making cautious user behavior and basic security hygiene effective defensive measures against this emerging threat.

Recommendations

User Awareness and Social Engineering Defense

Organizations must educate users to remain alert to suspicious messages, unexpected emails, malicious links, or attachments, especially those pushing urgency or requesting users to run files or execute commands. SantaStealer infostealer campaigns often rely on simple social engineering tactics, and training users to pause and verify suspicious messages can prevent infections before malware execution begins. Implement security awareness training programs specifically addressing infostealer delivery methods and credential theft techniques.

Software Source Control and Application Whitelisting

Organizations should enforce policies prohibiting installation of software from unofficial sources, as cracked software, game cheats, and unknown browser extensions are common hiding places for infostealers like SantaStealer. Only permit application installation from trusted vendors and regularly audit installed tools and browser plugins, removing unrecognized or unnecessary extensions. Implement application whitelisting technologies to prevent execution of unauthorized software including Malware-as-a-Service infostealers.

Account Security Hardening

Organizations must mandate strong, unique passwords across all accounts and enable multi-factor authentication wherever possible, especially for email accounts and browser-linked services. These security controls greatly reduce the damage potential even if credentials are stolen by SantaStealer malware. Implement password manager solutions to facilitate unique credential generation and storage, reducing credential reuse vulnerabilities targeted by information-stealing malware.

Enhanced Endpoint Protection Deployment

Organizations must deploy next-generation antivirus solutions and endpoint detection and response platforms capable of identifying and blocking SantaStealer malware variants. Leverage behavioral analysis and machine learning-based detection capabilities to spot suspicious activities characteristic of information stealers, including memory injection techniques, anti-analysis checks, credential harvesting operations, and unauthorized data exfiltration attempts associated with Malware-as-a-Service platforms.

Indicators of Compromise (IOCs)

SHA256 Hashes:

  • 1a277cba1676478bf3d47bec97edaa14f83f50bdd11e2a15d9e0936ed243fd64
  • abbb76a7000de1df7f95eef806356030b6a8576526e0e938e36f71b238580704
  • 5db376a328476e670aeefb93af8969206ca6ba8cf0877fd99319fa5d5db175ca
  • a8daf444c78f17b4a8e42896d6cb085e4faad12d1c1ae7d0e79757e6772bddb9
  • 5c51de7c7a1ec4126344c66c70b71434f6c6710ce1e6d160a668154d461275ac
  • 48540f12275f1ed277e768058907eb70cc88e3f98d055d9d73bf30aa15310ef3
  • 99fd0c8746d5cce65650328219783c6c6e68e212bf1af6ea5975f4a99d885e59
  • ad8777161d4794281c2cc652ecb805d3e6a9887798877c6aa4babfd0ecb631d2
  • 73e02706ba90357aeeb4fdcbdb3f1c616801ca1affed0a059728119bd11121a4
  • e04936b97ed30e4045d67917b331eb56a4b2111534648adcabc4475f98456727
  • 66fef499efea41ac31ea93265c04f3b87041a6ae3cd14cd502b02da8cc77cca8
  • 4edc178549442dae3ad95f1379b7433945e5499859fdbfd571820d7e5cf5033c
  • 926a6a4ba8402c3dd9c33ceff50ac957910775b2969505d36ee1a6db7a9e0c87
  • 9b017fb1446cdc76f040406803e639b97658b987601970125826960e94e9a1a6
  • F81f710f5968fea399551a1fb7a13fad48b005f3c9ba2ea419d14b597401838c

IPv4:Port:

  • 31[.]57[.]38[.]244[:]6767
  • 80[.]76[.]49[.]114[:]6767

MITRE ATT&CK TTPs

TA0042 – Resource Development

  • T1583: Acquire Infrastructure (Server)
  • T1587: Develop Capabilities (Malware)

TA0004 – Privilege Escalation

  • T1574: Hijack Execution Flow (DLL)

TA0005 – Defense Evasion

  • T1027: Obfuscated Files or Information
  • T1027.007: Dynamic API Resolution
  • T1027.009: Embedded Payloads
  • T1027.013: Encrypted/Encoded File
  • T1055: Process Injection (Portable Executable Injection, Process Hollowing)
  • T1070: Indicator Removal (File Deletion)
  • T1140: Deobfuscate/Decode Files or Information
  • T1497: Virtualization/Sandbox Evasion (System Checks, Time Based Checks)
  • T1620: Reflective Code Loading
  • T1622: Debugger Evasion

TA0006 – Credential Access

  • T1528: Steal Application Access Token
  • T1539: Steal Web Session Cookie
  • T1552: Unsecured Credentials (Credentials In Files, Private Keys)
  • T1555: Credentials from Password Stores
  • T1555.003: Credentials from Web Browsers

TA0007 – Discovery

  • T1057: Process Discovery
  • T1082: System Information Discovery
  • T1083: File and Directory Discovery
  • T1087: Account Discovery (Email Account)
  • T1217: Browser Information Discovery
  • T1497.001: System Checks
  • T1518: Software Discovery
  • T1614: System Location Discovery (System Language Discovery)

TA0009 – Collection

  • T1005: Data from Local System
  • T1113: Screen Capture
  • T1114: Email Collection (Local Email Collection)
  • T1115: Clipboard Data
  • T1119: Automated Collection
  • T1213: Data from Information Repositories (Messaging Applications)

TA0010 – Exfiltration

  • T1020: Automated Exfiltration
  • T1030: Data Transfer Size Limits
  • T1041: Exfiltration Over C2 Channel
  • T1560: Archive Collected Data (Archive via Library)

TA0011 – Command and Control

  • T1071: Application Layer Protocol (Web Protocols)

TA0040 – Impact

  • T1657: Financial Theft

References

https://www.rapid7.com/blog/post/tr-santastealer-is-coming-to-town-a-new-ambitious-infostealer-advertised-on-underground-forums/


Three-Slide Presentation Summary

Slide 1: Overview

Attack: SantaStealer – An Emerging MaaS Infostealer Ahead of Its 2025 Debut

SantaStealer is a new Malware-as-a-Service infostealer (rebranded from BluelineStealer) actively marketed on Telegram and Russian forums. Despite claims of being “fully undetected,” samples remain largely unobfuscated, making detection straightforward.


Slide 2: Technical Impact

Risks:

  1. Comprehensive credential and cryptocurrency wallet theft
  2. Browser data, cookies, and stored password exfiltration
  3. Telegram, Discord, and Steam account compromise
  4. Screenshot capture and clipboard monitoring

Affected Platform: Windows

Malware: SantaStealer (formerly BluelineStealer)

Target Region: Worldwide (excluding CIS countries)

Pricing: $175-$300/month subscription model


Slide 3: Top 3 Recommendations

  1. Verify Software Sources: Block cracked software, cheats, and unofficial browser extensions; only install from trusted vendors
  2. Strengthen Account Security: Enforce unique passwords and multi-factor authentication, especially for email and browser-linked accounts
  3. Deploy Advanced Endpoint Protection: Implement NGAV and EDR with behavioral analysis to detect memory injection and credential harvesting

Social Media Caption

🚨 SantaStealer: A new MaaS infostealer is being marketed on underground forums for $175-$300/month. Despite “fully undetected” claims, current samples are poorly obfuscated. It targets credentials, crypto wallets, and messaging apps. Deploy EDR and enforce MFA now.

#SantaStealer #MaaS #InfoStealer #CyberSecurity #ThreatIntel #Malware #InfoSec #CredentialTheft

pdf

9:28 PM

I’ll analyze this sixth PDF and provide the comprehensive outputs you requested.


SEO-Optimized Summary

Summary

Apple has released emergency security updates to address two actively exploited zero-day vulnerabilities in its WebKit browser engine, tracked as CVE-2025-43529 and CVE-2025-14174, affecting Safari and all browsers on iOS and iPadOS platforms. These critical Apple WebKit zero-day vulnerabilities affect WebKit on macOS and other Apple platforms including watchOS, tvOS, and visionOS, and can be triggered simply by visiting a maliciously crafted webpage without requiring additional user interaction. Apple confirmed the WebKit vulnerabilities were used in highly sophisticated, targeted attacks against specific individuals, potentially enabling remote code execution on compromised Apple devices. CVE-2025-43529 is a use-after-free vulnerability in WebKit that allows attackers to manipulate memory state and execute arbitrary code when crafted web content is processed. CVE-2025-14174 is a memory corruption issue tied to the ANGLE graphics abstraction layer used in WebKit, originally observed and patched by Google in Chrome before being disclosed as a shared CVE affecting multiple browser platforms. Because WebKit is mandatory for all third-party browsers on iOS and iPadOS, these Apple zero-day flaws extend beyond Safari to any browser on those platforms that relies on WebKit for web content rendering. The ANGLE-related memory corruption aspect of CVE-2025-14174 highlights that the underlying vulnerability has cross-browser implications beyond Apple’s technology stack, also affecting Google Chrome and Microsoft Edge on macOS platforms. Given the confirmed in-the-wild exploitation and broad platform impact across iOS, iPadOS, macOS, watchOS, tvOS, and visionOS, immediate patching is critical to reduce the risk of Apple device compromise through drive-by attacks. Apple released patches in iOS/iPadOS 26.2 and 18.7.3 for older devices, macOS Tahoe 26.2, Safari 26.2, and updated versions of tvOS, watchOS, and visionOS to remediate these actively exploited WebKit zero-day vulnerabilities.

Vulnerability Details

Emergency Apple Security Updates and Zero-Day Disclosure

Apple has released emergency security updates across its entire platform stack to remediate two actively exploited zero-day vulnerabilities in its WebKit browser engine, tracked as CVE-2025-43529 and CVE-2025-14174. These critical flaws affect WebKit, the rendering engine behind Safari and all browsers on iOS and iPadOS platforms, meaning that virtually any web content rendered in these environments could trigger the vulnerabilities. Apple confirmed that at least one of the WebKit bugs was used in highly sophisticated real-world attacks against specific targeted individuals before security patches were available, underscoring the immediate risk posed by both zero-day issues.

CVE-2025-43529: Use-After-Free Vulnerability

CVE-2025-43529 is a use-after-free vulnerability in Apple WebKit. A use-after-free occurs when a program continues to use memory after it has been released, potentially allowing an attacker to manipulate memory state and execute arbitrary code when crafted web content is processed by Safari or other WebKit-based browsers. This kind of memory corruption flaw is often a key component in remote exploitation chains targeting Apple devices. The vulnerability can be triggered when the browser loads maliciously crafted web content, with no additional application installation required by victims.

CVE-2025-14174: ANGLE Graphics Engine Memory Corruption

CVE-2025-14174 is a memory corruption issue tied to the ANGLE graphics abstraction layer used in WebKit for rendering graphics content. Originally observed and patched by Google in Chrome, this vulnerability was subsequently disclosed as a shared CVE affecting multiple browser implementations beyond Google’s technology stack. Both Apple WebKit zero-day vulnerabilities can be triggered when the browser loads maliciously crafted web content through drive-by attacks, with no additional user interaction beyond visiting a compromised or malicious website.

Cross-Platform and Cross-Browser Impact

Because WebKit is mandatory for all third-party browsers on iOS and iPadOS by Apple’s platform requirements, these zero-day flaws extend beyond Safari to any browser on those platforms that relies on WebKit for web content rendering. The vulnerabilities also affected WebKit on macOS and other Apple operating systems such as tvOS, watchOS, and visionOS. The ANGLE-related memory corruption aspect of CVE-2025-14174, shared with Chrome’s implementation, highlights that the underlying issue has significant cross-browser implications beyond just Apple’s technology stack, also affecting Google Chrome version 143.0.7499.110 and Microsoft Edge version 143.0.3650.80 on macOS platforms.

Apple Security Patches and Update Deployment

To address these high-severity WebKit zero-day issues, Apple released security patches in iOS/iPadOS 26.2 and 18.7.3 for older devices, macOS Tahoe 26.2, Safari 26.2, and updated versions of tvOS 26.2, watchOS 26.2, and visionOS 26.2. Users and administrators are strongly urged to apply these Apple security updates immediately because unpatched devices remain vulnerable to code execution and complete device compromise via crafted web pages delivered through drive-by attacks or targeted exploitation campaigns.

Recommendations

Immediate Apple Security Update Deployment

Organizations must ensure all Apple devices are updated to the latest patched versions immediately, including iOS/iPadOS 26.2 or 18.7.3 for older devices, macOS Tahoe 26.2, Safari 26.2, and corresponding updates for watchOS 26.2, tvOS 26.2, and visionOS 26.2. Unpatched Apple systems remain vulnerable to remote exploitation via maliciously crafted web content delivered through WebKit zero-day vulnerabilities. Implement mobile device management solutions to enforce automatic update policies across enterprise Apple device deployments.

Third-Party Browser Updates on macOS

Organizations must update Google Chrome to version 143.0.7499.110 or later and Microsoft Edge to version 143.0.3650.80 or later on macOS platforms, as CVE-2025-14174 affects the shared ANGLE graphics engine used across multiple browsers beyond Apple’s WebKit implementation. Verify that all Chromium-based browsers deployed on macOS systems receive appropriate security patches addressing the ANGLE memory corruption vulnerability.

Enhanced Monitoring and Detection Capabilities

Organizations should monitor endpoints and mobile device logs for abnormal browser crashes, WebKit or GPU process failures, and unusual WebGL activity patterns that may indicate Apple zero-day exploitation attempts. Implement endpoint detection and response solutions capable of identifying memory corruption exploitation techniques and unexpected process terminations associated with browser rendering engine attacks targeting WebKit vulnerabilities.

Malicious Web Content Exposure Reduction

Organizations should enforce web filtering where operationally possible, educate users against clicking untrusted links, and consider enabling Apple Lockdown Mode for users at elevated risk until patching is fully completed across all Apple devices. Lockdown Mode provides additional protections against sophisticated attacks targeting WebKit and other Apple platform components, though it may impact some device functionality and should be deployed strategically for high-risk users.

MITRE ATT&CK TTPs

TA0042 – Resource Development

  • T1588: Obtain Capabilities
  • T1588.005: Exploits
  • T1588.006: Vulnerabilities

TA0001 – Initial Access

  • T1189: Drive-by Compromise
  • T1190: Exploit Public-Facing Application

TA0002 – Execution

  • T1059: Command and Scripting Interpreter
  • T1059.007: JavaScript
  • T1203: Exploitation for Client Execution

TA0004 – Privilege Escalation

  • T1068: Exploitation for Privilege Escalation

TA0005 – Defense Evasion

  • T1211: Exploitation for Defense Evasion

TA0006 – Credential Access

  • T1555: Credentials from Password Stores

User Execution

  • T1204: User Execution
  • T1204.001: Malicious Link

References

https://support.apple.com/en-us/100100 https://support.apple.com/en-us/125892 https://support.apple.com/en-us/125886 https://support.apple.com/en-us/125885 https://support.apple.com/en-us/125884 https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14174 https://hivepro.com/threat-advisory/google-chrome-zero-day-exploited-in-angle-graphics-engine/

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox