Malware

New Infostealer Malware Targets Browser-Stored Credentials at Scale

April 3, 2026 · 8 min read

Table of Contents

Overview

Security researchers at multiple threat intelligence firms have identified a new information-stealing malware family that is rapidly gaining traction in underground markets. Dubbed ChromeShade by analysts at Proofpoint, who published the first detailed report on March 30, the malware specifically targets browser-stored credentials, session cookies, autofill data, and cryptocurrency wallet extensions.

ChromeShade first appeared in dark web marketplaces in early February 2026, advertised as a "next-generation stealer" with advanced evasion capabilities and broad browser support. Since its initial sale, telemetry data suggests infections have spread to an estimated 2.3 million endpoints globally, with the highest concentration in North America, Western Europe, and Southeast Asia.

The malware is sold on a subscription basis — $200 per month or $1,500 for a lifetime license — and includes a web-based management panel for operators to view and export stolen data. This low barrier to entry has attracted a large number of threat actors with varying levels of sophistication.

Distribution Methods

ChromeShade is distributed through several vectors, reflecting the diverse affiliates deploying it:

Phishing campaigns: The most common distribution method involves emails with malicious attachments — typically password-protected ZIP files containing a disguised executable. Campaigns observed in March used themes including fake invoice notifications, shipping confirmations, and tax-related documents timed with the US tax season.

Fake browser updates: Compromised websites display convincing browser update prompts that mimic Chrome, Firefox, and Edge update notifications. When users click the update button, they download a trojanized installer that deploys ChromeShade alongside a legitimate-looking (but outdated) browser update.

Malvertising: Malicious advertisements on file-sharing sites and cracked software repositories redirect users through a chain of intermediary domains before delivering the payload. The ads often promote free PDF converters, video editors, and VPN tools.

Social Engineering Note: The fake browser update pages used by ChromeShade are exceptionally well crafted. They replicate the exact styling of legitimate browser update pages, including correct version numbers and changelogs pulled from real release notes. Users should only update browsers through the browser's built-in update mechanism — never from external web pages.

SEO poisoning: Some affiliates have invested in search engine optimization for malicious pages that rank for queries related to free software, license key generators, and technical troubleshooting guides. Users searching for these terms are directed to pages that deliver ChromeShade through seemingly helpful downloads.

Technical Capabilities

Once executed, ChromeShade performs the following actions on the infected system:

Browser Credential Theft

The malware targets all Chromium-based browsers (Chrome, Edge, Brave, Opera, Vivaldi) and Firefox. It extracts:

For Chromium-based browsers on Windows, ChromeShade bypasses Chrome's encryption of stored credentials by leveraging the Windows DPAPI (Data Protection API) with the user's context. On macOS, it prompts the user for their system password through a fake Keychain Access dialog.

Cryptocurrency Wallet Theft

ChromeShade specifically targets browser extensions for popular cryptocurrency wallets, including MetaMask, Phantom, Coinbase Wallet, and Trust Wallet. It extracts wallet seed phrases, private keys, and transaction history. The malware also monitors the clipboard for cryptocurrency addresses and replaces them with attacker-controlled addresses — a technique known as clipboard hijacking.

Additional Data Collection

Evasion Techniques

ChromeShade employs several techniques to avoid detection:

Fileless execution: The initial dropper downloads the main payload directly into memory using reflective DLL injection, leaving minimal artifacts on disk for static scanning tools to detect.

Anti-analysis checks: Before executing its payload, ChromeShade checks for indicators of virtual machines, sandboxes, and analysis environments. It examines hardware identifiers, running processes, screen resolution, mouse movement patterns, and recently opened files. If any analysis indicators are detected, the malware terminates silently.

Timestomping: Any files written to disk have their timestamps modified to match those of legitimate system files, making forensic timeline analysis more difficult.

Encrypted exfiltration: Stolen data is encrypted with AES-256 before being exfiltrated over HTTPS to attacker-controlled infrastructure. The command-and-control (C2) communication uses legitimate cloud services — including Discord webhooks, Telegram bot APIs, and cloud storage platforms — to blend in with normal network traffic.

Polymorphic packing: Each build of ChromeShade is packed with a unique encryption key, meaning every distributed copy has a different hash. This renders signature-based detection ineffective for new variants.

Detection Challenge: Because ChromeShade uses legitimate cloud services for data exfiltration and employs encrypted communications, traditional network-based detection that relies on identifying known malicious domains or unencrypted data patterns will miss this threat. Behavioral detection at the endpoint level is essential.

Indicators of Compromise

The following IOCs have been shared by multiple research teams. Note that ChromeShade's polymorphic nature means file hashes change frequently, so behavioral indicators are more reliable for ongoing detection.

Behavioral indicators:

Network indicators:

File system indicators:

Prevention and Remediation

Organizations and individuals can take the following steps to protect against ChromeShade and similar infostealers:

If a ChromeShade infection is confirmed, assume all browser-stored credentials are compromised. Reset passwords for all accounts that had credentials saved in any browser on the affected system, revoke active sessions, and rotate any API keys or tokens that may have been stored in browser profiles.

"Infostealers have become the on-ramp for more severe compromises. A single stolen session cookie can bypass MFA and give an attacker full access to corporate cloud environments. Organizations must treat infostealer infections as seriously as they would any other network intrusion."

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free