[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fiR567uJmwtDTWSu-BeS89i8Xhwura4nhufOWc35nAac":3},{"article":4,"iocs":50},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":29,"category":30,"article_tags":34},"a9b22630-c61d-48c1-9851-4f34b7324698","Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution","inside-the-remus-infostealer-session-theft-maas-and-rapid-evolution-84eb27","Stolen browser sessions and authentication tokens are becoming more valuable than stolen passwords. Flare explains how the REMUS infostealer evolved around session theft and operational scalability. [...]","REMUS, a new infostealer malware, has rapidly evolved from a basic credential-stealing tool into a sophisticated malware-as-a-service (MaaS) platform between February and May 2026. Analysis of 128 underground posts reveals the operator's focus shifted from simple password theft to session-token harvesting, password-manager targeting (1Password, LastPass, Bitwarden), and operational scalability with features like worker tracking, statistics pages, and SOCKS5 proxy support. The operation demonstrates how modern MaaS platforms increasingly resemble legitimate software businesses with continuous development cycles and customer-oriented features.","REMUS infostealer malware evolves into MaaS platform targeting session tokens and password managers.","Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution Sponsored by Flare May 15, 2026 10:02 AM 0 In recent months, a new infostealer malware known as REMUS has emerged across the cybercrime landscape, drawing attention from security researchers and malware analysts. Several technical analyses published in recent months focused on the malware’s capabilities, infrastructure, and similarities to Lumma Stealer, including browser targeting mechanisms, and credential theft functionality and more. However, far less attention has been given to the underground operation behind the malware itself. An analysis conducted by Flare researchers of 128 posts linked to the REMUS underground operation between February 12 and May 8, 2026, provides a rare look into how the group presents, develops, and operationalizes the malware within underground communities. By analyzing the actor’s advertisements, update logs, feature announcements, operational discussions, and customer-facing communications, the research helps map how the operation evolved over time and what priorities drove its development. The findings reveal not only the rapid evolution of the stealer’s capabilities, but also a growing focus on commercialization, operational scalability, session theft, and password-manager targeting. More broadly, the activity offers insight into how modern malware-as-a-service (MaaS) operations increasingly resemble structured software businesses, with continuous development cycles, operational refinements, and features designed to improve usability, persistence, and long-term monetization. The underground activity reveals a highly compressed but aggressive development cycle, with the operator repeatedly publishing feature updates, operational refinements, and new collection capabilities over just a few months. Rather than advertising a static malware build, the posts portray an actively maintained MaaS platform evolving in near real time. February 2026 marked the initial commercial push. Early posts focused on establishing REMUS as a reliable and easy-to-use stealer, promoting browser credential theft, cookie collection, Discord token theft, Telegram delivery, and basic log management. The tone was highly promotional and customer-oriented. In one of the earliest posts, the operator claimed: “With good crypting and a dedicated intermediary server, the callback rate is ~90%.” Another post marketed the malware as featuring “24\u002F7 support” and functionality “simple enough that even a child can figure it out” highlighting a strong emphasis on usability and commercialization from the beginning. March 2026 represented the campaign’s most active development period. During this phase, the operator introduced restore-token functionality, expanded log handling, worker tracking, statistics pages, duplicate-log filtering, and improved Telegram delivery workflows. Multiple posts focused not on theft itself, but on operational visibility and campaign management. One update added worker nicknames to log tables and statistics views, while another improved loader execution visibility so operators could better understand failed infections. The shift suggests REMUS was evolving into a broader operational platform rather than just a malware executable. April 2026 showed a clear move toward session continuity and browser-side authentication artifacts. The operator added SOCKS5 proxy support, improved token restoration, anti-VM toggles, gaming-platform targeting, and password-manager-related collection. One update explicitly stated: “Added IndexedDB collection for 1Password and LastPass extensions.” Another referenced Bitwarden-related searches. The posts increasingly emphasized authenticated sessions, restore workflows, and browser-side storage rather than standalone credentials alone. By early May 2026, the operation appeared focused on refinement and operational stability. The remaining posts in the dataset referenced restore improvements, bug fixes, collection optimizations, and continued adjustments to delivery and management functionality, suggesting the operator was shifting from rapid feature expansion toward platform stabilization. REMUS and Its Connection to Lumma Screenshot from Flare's platform showing one of REMUS’s earliest posts.Sign up for the free trial to access if you aren’t already a customer. Public reporting has largely focused on REMUS as a technically significant successor or variant of the Lumma Stealer. Researchers described the malware as a 64-bit infostealer sharing multiple similarities with Lumma, including anti-VM checks, browser-focused credential theft, and browser encryption bypass techniques. That technical overlap is important, but the underground data suggests the story extends far beyond malware lineage. The analyzed posts show a threat actor aggressively building a commercial cybercrime product around the malware. The operation repeatedly promoted updates, customer support, performance improvements, and additional collection capabilities in a way that strongly resembles legitimate software development cycles. In one early post, the operator claimed the malware could achieve approximately “90%” successful delivery rates when paired with proper crypting and an intermediary server, language clearly aimed at reassuring potential buyers about operational reliability. Stolen Sessions Are the New Stolen Passwords Infostealers like REMUS don't just harvest credentials anymore, they capture cookies, browser tokens, and authenticated sessions that bypass MFA entirely. Flare monitors millions of stealer logs across dark web markets and Telegram channels continuously, so you can detect exposed sessions and credentials before attackers use them against you. Detect your exposure for free. A Shift Toward Session Theft and the Rising Value of Cookies Screenshot from Flare’s platform showing an example of the high demand for “cookies.”Sign up for the free trial to access if you aren’t already a customer. One of the clearest themes across the REMUS campaign is the growing emphasis on session theft rather than traditional credential harvesting alone. Historically, many infostealers focused primarily on usernames and passwords. REMUS, however, repeatedly emphasized cookie collection, token handling, browser sessions, proxy-assisted restoration, and authenticated access continuity. From the earliest stages of the campaign, the malware promoted browser sessions and authentication artifacts as a core part of its value. This reflects a broader shift across the underground economy, where stolen cookies and authenticated sessions have increasingly become a highly valuable commodity. Instead of stealing credentials and attempting to log in later, attackers increasingly seek already authenticated sessions that may bypass MFA prompts, login alerts, device verification, and risk-based authentication systems. Multiple REMUS updates referenced “Restore” improvements, proxy compatibility, and support for multiple proxy types during token restoration workflows, strongly suggesting the operator viewed session persistence as a major selling point. Several updates also focused on platforms where active sessions carry substantial value, including Discord, Steam, Riot Games, and Telegram-linked environments. Combined with cookie collection and restore functionality, the campaign increasingly appeared designed not just to steal credentials, but to preserve and operationalize authenticated access itself. Password Managers Become High-Value Targets The most significant late-stage evolution observed in the campaign involved password-manager-related collection. By April 2026, the operator was advertising support tied to Bitwarden, 1Password, LastPass, and IndexedDB browser storage. Password managers increasingly represent concentrated stores of valuable credentials and authentication material. The references to IndexedDB are especially relevant because modern browser applications and ex","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fsecurity\u002Finside-the-remus-infostealer-session-theft-maas-and-rapid-evolution\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fposts\u002F2026\u002F05\u002Finfostealer-header.jpg","2026-05-15T14:02:12+00:00","2026-05-15T16:00:03.968891+00:00",8,[18,21,23,25,27],{"name":19,"type":20},"1Password","product",{"name":22,"type":20},"LastPass",{"name":24,"type":20},"Bitwarden",{"name":26,"type":20},"Discord",{"name":28,"type":20},"Telegram","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":29,"icon":31,"name":32,"slug":33},null,"Malware","malware",[35,40,45],{"category":36},{"id":37,"icon":31,"name":38,"slug":39},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":41},{"id":42,"icon":31,"name":43,"slug":44},"2c8f44d4-b56e-47cf-9677-04f22c9ee78d","Identity & Access","identity-access",{"category":46},{"id":47,"icon":31,"name":48,"slug":49},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[51,54],{"type":33,"value":52,"context":53},"REMUS","Infostealer malware with session-theft and password-manager targeting capabilities, distributed as MaaS",{"type":33,"value":55,"context":56},"Lumma Stealer","Related infostealer with similar browser-targeting and credential-theft mechanisms"]