Arkanix Stealer expands its reach: A deep dive into data theft and the MaaS referral initiative

Feb 19, 2026 | Threat Intelligence Research

New Malware as a Service: Arkanix Stealer Emerges

Threat intelligence from Kaspersky has unveiled a new malware strain called “Arkanix Stealer,” primarily functioning as a malware-as-a-service (MaaS). This stealer includes various features aimed at collecting sensitive information, particularly from users involved in cryptocurrency and gaming.

Arkanix raises concerns because it operates through a comprehensive control panel that allows users to adjust payloads and access statistics. The malware comprises both a C++ executable and a Python version, enabling a flexible distribution strategy. The exact method of initial infection remains unclear, though it likely involves phishing techniques, as inferred from file names associated with the malware. Once executed, the loader downloads the Arkanix payload, which is packed with various data collection capabilities—from system information and browser data to specific information from Telegram and Discord.

In addition to collecting general user data, Arkanix particularly targets cryptocurrency wallet credentials and online banking information. Its design includes built-in mechanisms for obfuscation and self-spreading through social media platforms. The campaign appears to have been short-lived, with reports indicating that the control panel may have already been taken down.

Why This Matters

The functionality of Arkanix Stealer poses significant risks, particularly for users engaged in cryptocurrency transactions and uncertain online security practices. The malware not only steals sensitive data but also exploits communication platforms, making it a versatile threat. Defenders must remain vigilant and proactive in addressing potential phishing attacks and the rise of such malware.

Enhanced threat intelligence and monitoring tools, like SIEMs and vulnerability scanners, can mitigate risks from such malware campaigns. Implementing multi-factor authentication and regular system updates can further safeguard personal and financial information.

Indicators of Compromise (IOCs)

Domains:

  • arkanix[.]pw (IP: 195.246.231.60)
  • arkanix[.]ru (IP: 172.67.186.193)

File Hashes:

  • Python Loader: MD5 208fa7e01f72a50334f3d7607f6b82bf
  • Python Stealer: MD5 af8fd03c1ec81811acf16d4182f3b5e1
  • Native Stealer: MD5 a3fc46332dcd0a95e336f6927bae8bb7
  • Additional Native Sample: MD5 3283f8c54a3ddf0bc0d4111cc1f950c0

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles