TI Mindmap HUB
Threat Intelligence Report

Hybrid Analysis Blog: LeakyInjector and LeakyStealer Duo Hunts For Crypto and Browser History

πŸ“… November 18, 2025 πŸ“° hybrid-analysis.blogspot.com πŸ” 0 CVE(s) referenced

A newly discovered, two-stage malware campaign uses valid code-signing certificates and advanced injection techniques to stealthily steal cryptocurrency wallets and browser history data from Windows systems, posing a significant threat to users’ digital assets and privacy.

researcher

Sign in to access the full report including:
detailed analysis, IOCs, MITRE ATT&CK mapping, and STIX bundle.

πŸ” Sign In to Read Full Report

You'll need to accept our Terms of Service to access the platform.

πŸ“Š Visual Mindmap
🎯 IOC Extraction
βš”οΈ MITRE ATT&CK TTPs
πŸ“¦ STIX 2.1 Bundle