Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    A $30 malware tool written in ancient Visual Basic quietly steals credentials and opens corporate networks to widespread cybercrime

    March 9, 2026

    Oracle Axing Huge Number of Jobs as AI Crisis Intensifies

    March 9, 2026

    Samsung Galaxy Buds 4 Pro review: not everything’s upgraded

    March 9, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Tech Gadgets»A $30 malware tool written in ancient Visual Basic quietly steals credentials and opens corporate networks to widespread cybercrime
    A  malware tool written in ancient Visual Basic quietly steals credentials and opens corporate networks to widespread cybercrime
    Tech Gadgets

    A $30 malware tool written in ancient Visual Basic quietly steals credentials and opens corporate networks to widespread cybercrime

    The Tech GuyBy The Tech GuyMarch 9, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement




    • $30 DarkCloud infostealer quietly harvests credentials across browsers and enterprise software
    • Legacy Visual Basic code is unexpectedly helping malware evade some modern detection tools
    • Cheap credential-stealing tools are increasingly driving early-stage corporate network compromises

    Low-cost malware tools are increasingly available on the dark web, offering credential theft capabilities to individuals with limited technical knowledge.

    Advertisement

    Security researchers at Flashpoint recently analyzed a malware strain known as DarkCloud, which has circulated via Telegram channels and public storefronts since approximately 2022.

    Available for roughly $30, less than the price of many console games, the tool performs large-scale credential harvesting, with stolen information may include browser logins, cookies, financial data, and contact information from email applications.

    Article continues below


    You may like

    Cheap infostealers lowering barrier to cybercrime

    DarkCloud advertises itself as surveillance software in public listings, although its internal functionality focuses on extracting credentials and sensitive data from infected machines.

    Researchers say this type of infostealer has become a frequent entry point into corporate networks, where compromised credentials often lead to deeper network intrusion.

    One unusual aspect of DarkCloud is its use of the outdated programming environment Visual Basic 6.0, as the malware payload is written in this legacy language before being compiled into a native executable.

    Visual Basic 6.0 relies on older runtime components which still function on modern Windows systems – and according to Flashpoint analysts, this design choice may reduce detection rates in some security tools because many detection systems focus on more modern development frameworks.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The malware also uses multiple layers of string encryption and obfuscation, complicating reverse engineering and static analysis.

    Internal strings remain encrypted until runtime, where a pseudo-random generator reconstructs them through deterministic processes.

    These techniques do not rely on novel cryptography, instead they exploit predictable behaviors inside legacy programming environments.


    What to read next

    DarkCloud concentrates on collecting credentials and application data from a wide range of software, extracting information from web browsers, email clients, file transfer programs, and several communication tools.

    Collected data is stored locally inside directories created under the Windows templates path.

    One directory holds copied database files, while another contains parsed information written in unencrypted text format.

    This staging system allows the malware to assemble structured logs before transmitting them externally.

    The tool supports several methods for transmitting stolen information.

    These include email transmission through SMTP, file transfer using FTP servers, communication through Telegram channels, and direct HTTP uploads.

    Because compromised credentials often allow lateral movement inside networks, attackers may later deploy ransomware, launch phishing operations, or maintain persistent access.

    Even basic endpoint protection or a properly configured firewall may struggle to detect activity if the malware uses legitimate protocols.

    Security teams therefore frequently rely on layered controls, including credential monitoring and incident response procedures alongside malware removal tools.

    The continued circulation of inexpensive infostealers suggests that low entry cost, rather than technical sophistication, increasingly drives early-stage network compromise.


    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.



    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    vivo V70 FE is official with a 200MP rear camera, 7,000mAh battery

    March 9, 2026

    Google may disable a key Chrome feature to boost Android security

    March 9, 2026

    Why I still pay for a VPN even though free ones are everywhere

    March 9, 2026

    12 of the best sleep-hacking gadgets to help you get the best rest of your life — by a former Sleep Editor

    March 8, 2026

    iPhone 17e, M5 Pro/Max, MacBook Neo, Nothing Phone (4a) Pro debut

    March 8, 2026

    Need a power station? These two Anker ones are nearly half off

    March 8, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    A $30 malware tool written in ancient Visual Basic quietly steals credentials and opens corporate networks to widespread cybercrime

    March 9, 2026

    Oracle Axing Huge Number of Jobs as AI Crisis Intensifies

    March 9, 2026

    Samsung Galaxy Buds 4 Pro review: not everything’s upgraded

    March 9, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.