New ACRStealer Variant Uses Syscall Evasion to Avoid Security Detection

Related

Female Cybersecurity Leaders to Watch in North Carolina

North Carolina’s cybersecurity leadership strength cuts across state government,...

Female Cybersecurity Leaders to Watch in Minnesota

Minnesota’s cybersecurity leadership strength shows up across agriculture, banking,...

Google Deploys Gemini AI to Monitor Dark Web for Cyber Threats

What happened Google has deployed Gemini AI agents within its...

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

What happened Infinite Campus, a major U.S. K-12 student information...

Dutch Ministry of Finance Discloses Breach Affecting Employees

What happened The Dutch Ministry of Finance confirmed that some...

Share

What happened

Researchers identified a new variant of ACRStealer, an information-stealing malware family, that introduces syscall-based evasion techniques to bypass endpoint detection and response (EDR) monitoring. The updated malware communicates with its command-and-control servers over TLS-encrypted channels and includes the ability to deliver secondary payloads, expanding the attacker’s control over infected systems. ACRStealer, first reported in 2025 as a rebranded version of Amatera Stealer, is distributed through Malware-as-a-Service (MaaS) operations and has been observed spreading through loaders such as HijackLoader. The new syscall-evasion approach allows the malware to bypass common user-mode API monitoring techniques used by security tools, making it harder to detect during execution. 

Who is affected

Organizations and individuals running Microsoft Windows systems are affected if the malware is executed, as ACRStealer is designed to harvest sensitive data including credentials, browser information, and other stored system data. 

Why CISOs should care

The new variant demonstrates how infostealer malware continues to evolve with advanced evasion techniques, allowing attackers to bypass endpoint monitoring and deploy additional payloads once systems are compromised. 

3 practical actions

Monitor systems for syscall-based evasion behavior. Detect abnormal process activity designed to bypass API monitoring. 

Inspect suspicious loader activity. Investigate infections delivered through loaders such as HijackLoader that may deploy secondary payloads. 

Rotate exposed credentials. Assume credential theft may occur if ACRStealer infections are detected. 

For more reporting on threats involving credential-stealing malware, explore our latest coverage under the Malware tag.