New ACRStealer Variant Uses Syscall Evasion to Avoid Security Detection

Related

New TCLBanker Malware Self-Spreads Over WhatsApp and Outlook

What happened Elastic Security Labs has documented a new Brazilian...

Australia Warns of ClickFix Attacks Pushing Vidar Stealer Malware

What happened The Australian Signals Directorate’s Australian Cyber Security Centre...

North Korean Hackers Targeted Ethnic Koreans in China With Android Malware

What happened ESET researchers have attributed a supply chain attack...

Telegram Mini Apps Abused for Crypto Scams and Android Malware Delivery

What happened CTM360 researchers have uncovered a large-scale fraud operation...

Broken VECT 2.0 Ransomware Acts as a Data Wiper for Large Files

What happened Check Point researchers have disclosed that VECT 2.0...

Share

What happened

Researchers identified a new variant of ACRStealer, an information-stealing malware family, that introduces syscall-based evasion techniques to bypass endpoint detection and response (EDR) monitoring. The updated malware communicates with its command-and-control servers over TLS-encrypted channels and includes the ability to deliver secondary payloads, expanding the attacker’s control over infected systems. ACRStealer, first reported in 2025 as a rebranded version of Amatera Stealer, is distributed through Malware-as-a-Service (MaaS) operations and has been observed spreading through loaders such as HijackLoader. The new syscall-evasion approach allows the malware to bypass common user-mode API monitoring techniques used by security tools, making it harder to detect during execution. 

Who is affected

Organizations and individuals running Microsoft Windows systems are affected if the malware is executed, as ACRStealer is designed to harvest sensitive data including credentials, browser information, and other stored system data. 

Why CISOs should care

The new variant demonstrates how infostealer malware continues to evolve with advanced evasion techniques, allowing attackers to bypass endpoint monitoring and deploy additional payloads once systems are compromised. 

3 practical actions

Monitor systems for syscall-based evasion behavior. Detect abnormal process activity designed to bypass API monitoring. 

Inspect suspicious loader activity. Investigate infections delivered through loaders such as HijackLoader that may deploy secondary payloads. 

Rotate exposed credentials. Assume credential theft may occur if ACRStealer infections are detected. 

For more reporting on threats involving credential-stealing malware, explore our latest coverage under the Malware tag.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts