MalwareJanuary 17, 20264 min read

StealC XSS Flaw Let Researchers Monitor Malware Operators

CyberArk exploited a vulnerability in the StealC infostealer's control panel to identify threat actors, steal session cookies, and track an operator who compromised 5,000 victims.

James Rivera

CyberArk researchers discovered a cross-site scripting vulnerability in the StealC infostealer's web control panel and used it to gather intelligence on threat actors operating the malware. The ironic security failure—a credential-stealing malware that couldn't protect its own operators' credentials—let researchers observe active sessions, steal session cookies, and hijack panel access.

The disclosure represents a rare look into the operational security practices (or lack thereof) of infostealer operators, complete with hardware fingerprints and one actor's real IP address exposed when they briefly forgot to use a VPN.

How Researchers Exploited the Panel

A StealC code leak in spring 2025 gave CyberArk visibility into the malware's web-based control panel. The panel—used by operators to manage infected machines and access stolen data—contained a straightforward XSS flaw.

By exploiting the vulnerability, researchers could:

  • Collect browser and hardware fingerprints of StealC operators
  • Observe active sessions in real time
  • Steal session cookies from the panel
  • Hijack panel sessions remotely

Poor security practices by StealC's developers made the exploitation easier than it might have been. The panel didn't implement httpOnly cookie protections, exposing session cookies to JavaScript-based theft. Basic web application security would have prevented the most damaging aspects of the attack.

The YouTubeTA Case Study

CyberArk used their access to study a StealC operator they call "YouTubeTA." This actor compromised over 5,000 victim machines, stealing approximately 390,000 passwords and 30 million cookies.

Panel fingerprinting revealed YouTubeTA was a single operator running an Apple M3 processor, with consistent hardware signatures across all sessions. Language preferences showed support for English and Russian, while timezone data pointed to GMT+0300—Eastern European Summer Time.

Then YouTubeTA made a critical mistake. The operator briefly connected to their panel without VPN protection, exposing an IP address associated with Ukrainian ISP TRK Cable TV. That single slip provided a geographic indicator that combined with other fingerprint data to narrow down the actor's likely location.

YouTubeTA's Distribution Method

The operator built their victim count through a common but effective technique: hijacking legitimate YouTube channels. YouTubeTA targeted channels with established subscriber bases and long posting histories, then used stolen credentials to take them over.

After periods of inactivity to avoid suspicion, these compromised channels began promoting downloads of cracked software—primarily Adobe Photoshop and After Effects. Users seeking pirated software downloaded malware instead, feeding their credentials into YouTubeTA's growing database.

This distribution method exploits YouTube's trust signals. Channels with years of history and existing subscribers appear legitimate, making viewers more likely to follow malicious links.

Why Researchers Went Public

CyberArk deliberately published the vulnerability to disrupt StealC operations. "By posting the existence of the XSS we hope to cause at least some disruption in the use of the StealC malware, as operators re-evaluate using it," researcher Ari Novick explained.

The disclosure comes during turbulence in the malware-as-a-service market. Drama surrounding competing platforms has driven operators toward StealC, increasing its user base. By revealing the vulnerability, CyberArk aims to shake that confidence and push operators to reconsider their tooling choices.

Why This Matters

Infostealer infections have become a significant source of credential compromise across organizations. The ClickFix technique has made distribution easier, and stolen credentials enable everything from account takeover to network intrusion.

Understanding how infostealer operators work—their tools, their mistakes, their operational patterns—helps defenders anticipate threats and build better detections. The YouTubeTA case study demonstrates that even successful threat actors make operational security errors that can expose them.

For organizations concerned about infostealer threats, endpoint protection, credential monitoring, and user awareness training around pirated software remain the primary defenses. Our malware defense guide covers detection and prevention strategies.

The Bigger Picture

StealC's XSS vulnerability reflects a broader pattern: criminal tools often have poor security themselves. Malware authors focus on offensive capabilities while neglecting defensive fundamentals. Security researchers who gain access to these ecosystems can extract valuable intelligence—turning the tools of attackers against them.

CyberArk withheld specific technical details of the exploitation to prevent quick remediation by StealC developers. The goal isn't to help criminals fix their code; it's to create uncertainty that degrades trust in the platform.

Related Articles