top of page

StealC Malware Operators Exposed After Flawed Infrastructure Lets Researchers Hack the Hackers

Cybercriminals like to sell the illusion of professionalism. Malware dashboards are slick, subscription plans are clearly tiered, and promises of easy profits are framed with the language of software-as-a-service. But new research from CyberArk Labs shows how thin that polish can be, and how quickly the roles of attacker and victim can blur.


The case centers on StealC, an infostealer that has circulated since early 2023 and is sold through a malware-as-a-service model. Buyers use it to siphon cookies, passwords, and other sensitive data from infected machines. Like many offerings in the underground economy, StealC comes with a web-based control panel that tracks campaigns and logs stolen data, projecting the image of a mature criminal operation.


That image cracked in 2025.


Earlier that year, the developers behind StealC pushed out a major update, moving from version one to version two. Almost immediately, the web panel leaked. Shortly afterward, researchers at TRAC Labs published a blunt technical teardown questioning the quality and maturity of the malware. What went largely unnoticed was a more consequential discovery made during analysis of the leaked code. CyberArk Labs identified a vulnerability in the StealC panel that allowed researchers to observe and interact with the operators themselves.


By exploiting a simple cross-site scripting flaw, CyberArk researchers were able to fingerprint the systems used by StealC operators, monitor live sessions, and even steal session cookies from the infrastructure built to steal cookies from others. The irony was hard to miss. An operation whose core business relied on large-scale cookie theft had failed to implement basic protections such as httpOnly flags on its own session cookies.


CyberArk Labs deliberately withheld technical specifics to avoid helping criminals patch the flaw or encouraging copycats to resurrect the leaked panel. Instead, the researchers focused on what the access revealed about one particularly active StealC customer.


That operator stood out because of their campaign naming. Build identifiers included labels like YouTube, YouTube2, and YouTubeNew. Based on those markers, CyberArk dubbed the actor YouTubeTA. Panel data showed that YouTubeTA had amassed more than 5,000 victim logs, containing roughly 390,000 stolen passwords and over 30 million cookies, most of them low-value tracking data but still indicative of scale.


Screenshots automatically captured by the malware helped explain how those infections were happening. In many cases, victims were browsing YouTube for cracked versions of Adobe Photoshop and Adobe After Effects when StealC executed. The abused YouTube channels often looked legitimate, with old videos, long subscriber histories, and long stretches of inactivity before suddenly promoting pirated software. The evidence suggested that YouTubeTA was hijacking dormant creator accounts and repurposing them to distribute malware.


The StealC panel itself reinforced that theory. A feature called “markers” lets operators highlight stolen credentials from domains they care about most. In YouTubeTA’s panel, studio.youtube.com, the backend used by content creators, had its own category. The focus on creator credentials made it clear that account takeover was not a side effect but a strategy.


The same vulnerability that exposed campaign activity also enabled a deeper look at the operator behind it. CyberArk’s fingerprinting revealed consistent screen dimensions and graphics hardware across sessions, pointing to a single individual rather than a team. WebGL data indicated the use of an Apple Pro device with an M3 processor. Language support on the system included English and Russian. Time zone data showed GMT+0300, Eastern European Summer Time, narrowing the likely region.


Most telling was a slip in operational security. Although YouTubeTA typically accessed the panel through a VPN, one mid-July 2025 session did not appear to be masked. The IP address traced back to a Ukrainian internet service provider, aligning with the other indicators gathered through fingerprinting.


Taken together, the picture is less of a shadowy collective and more of a lone operator running a surprisingly effective criminal business from a fragile foundation.

The findings highlight a broader reality about the malware-as-a-service economy. The model allows individuals with limited resources to scale attacks dramatically by outsourcing development and infrastructure. But that same dependency introduces supply chain risks. When developers cut corners, their customers inherit those weaknesses.


In StealC’s case, sloppy panel security and poor cookie handling gave defenders a rare window into criminal operations. For researchers and law enforcement, the lesson is clear. The infrastructure that enables cybercrime is often rushed, reused, and poorly secured. Exploiting those weaknesses can turn the tables, exposing attackers to the same risks they impose on their victims.


CyberArk Labs emphasizes that its research relied on publicly available information and leaked artifacts and was conducted for defensive and educational purposes. The goal, the company says, is not to glamorize cybercrime but to strip away its mystique and show how brittle these operations really are.


StealC’s downfall offers a reminder that in the modern threat landscape, identity abuse cuts both ways. And sometimes, the easiest way to understand an attacker is to watch them trip over their own tools.

bottom of page