Arkanix Stealer pops up as short-lived AI info-stealer experiment

Published: (February 22, 2026 at 10:33 AM EST)
3 min read

Source: Bleeping Computer

Hand image

Introduction

An information‑stealing malware operation named Arkanix Stealer, promoted on multiple dark‑web forums toward the end of 2025, was likely developed as an AI‑assisted experiment. The project included a control panel and a Discord server for communication with users, but the author took them down without notification just two months after the operation began.

Arkanix offered many of the standard data‑stealing features that cybercriminals are used to, along with a modular architecture and anti‑analysis features.

Kaspersky researchers analyzed the Arkanix stealer and found clues indicating LLM‑assisted development, which “might have drastically reduced development time and costs.”

LLM traces in coding
Signs of LLM traces in coding – Source: Kaspersky

The researchers believe that Arkanix was a short‑lived project for quick financial gains, which makes detection and tracking much more difficult.

Arkanix appears online

Arkanix started being promoted on hacker forums in October 2025, offering two tiers to potential customers:

  • Basic – a Python‑based implementation.
  • Premium – a native C++ payload protected with VMProtect, integrating AV evasion and wallet injection features.

Arkanix promoted on hacker forums
Arkanix promoted on hacker forums – Source: Kaspersky

The developer set up a Discord server that acted as a community hub for updates, feature feedback, and support. A referral program was also established, granting referrers an extra free hour of premium access while new customers received one week of free premium access.

Referral options from within the dashboard
Referral options from within the dashboard – Source: Kaspersky

Data‑stealing capabilities

Arkanix can collect system information and steal data stored in browsers (history, autofill info, cookies, passwords) as well as cryptocurrency wallet data from 22 browsers. Kaspersky researchers note that it can also extract OAuth2 tokens on Chromium‑based browsers.

Additional capabilities include:

  • Stealing data from Telegram and Discord, spreading via the Discord API, and sending messages to victims’ friends/channels.
  • Targeting credentials for Mullvad, NordVPN, ExpressVPN, and ProtonVPN.
  • Archiving files from the local filesystem for asynchronous exfiltration.
  • Downloadable modules from the C2 server, such as a Chrome grabber, a wallet patcher for Exodus or Atomic, a screenshot tool, HVNC, and stealers for FileZilla and Steam.

Partial list of targeted crypto extensions
Partial list of targeted crypto extensions – Source: Kaspersky

Premium native C++ version

The premium native C++ version adds:

  • RDP credential theft, anti‑sandbox and anti‑debugging checks, WinAPI‑powered screen capturing.
  • Targeting of Epic Games, Battle.net, Riot, Unreal Engine, Ubisoft Connect, and GOG.
  • Delivery of the ChromElevator post‑exploitation tool, which injects into suspended browser processes to bypass Google’s App‑Bound Encryption (ABE) and steal user credentials.

The purpose of the Arkanix stealer experiment remains unclear; it may have been an attempt to evaluate how LLM assistance can accelerate malware development and feature delivery. Kaspersky assesses that Arkanix is “more of a public software product than a shady stealer.”

The researchers provide a comprehensive list of indicators of compromise (IoCs), including file hashes, domains, and IP addresses.

0 views
Back to Blog

Related posts

Read more »