XSS in StealC Panel Lets Researchers Steal Cookies, ID Actor

XSS in StealC control panel allowed session fingerprinting and cookie theft; leaked source code and weak cookie protections exposed operator details and a YouTube distributor that amassed ~5,000 logs, ~390,000 passwords and 30M+ cookies.

  • StealC panel contained an XSS flaw that let researchers capture system fingerprints, active sessions, and session cookies.
  • Leaked panel source code and poor cookie protections exposed operator and customer data, including one actor’s IP and hardware details.
  • A single customer, YouTubeTA, used YouTube to distribute the stealer and amassed thousands of logs, hundreds of thousands of passwords, and millions of cookies.

On Jan. 19, 2026, CyberArk researcher Ari Novick disclosed a cross-site scripting (XSS) flaw in the web control panel used by operators of the StealC information stealer, enabling collection of system fingerprints, session monitoring, and cookie theft, according to a report.

- Advertisement -

StealC first appeared in January 2023 as a Malware-as-a-service product that used YouTube to spread disguised cracked software. The malware later added features such as Telegram bot integration, improved payload delivery, and a redesigned administration panel known as StealC V2.

Weeks after the panel update, its source code was leaked, allowing researchers to analyze operator systems and retrieve active cookies, as detailed in an autopsy and a sample listing. XSS is a client-side injection that runs malicious JavaScript in a victim’s browser when sites fail to validate input, per MDN and a Fortinet explanation.

"By exploiting it, we were able to collect system fingerprints, monitor active sessions, and – in a twist that will surprise no one – steal cookies from the very infrastructure designed to steal them," Novick wrote in the report. The panel lacked basic protections such as httpOnly flags on cookies, leaving session cookies exposed.

Analysis identified a prominent customer named YouTubeTA, which promoted cracked Adobe products on YouTube and gathered over 5,000 logs containing about 390,000 stolen passwords and more than 30 million stolen cookies. Many of those cookies were tracking or non-sensitive cookies rather than high-value credentials.

- Advertisement -

Researchers also found a single admin account using an Apple M3 machine with English and Russian settings. An operational mistake in mid-July 2025 — failing to use a VPN — revealed a real IP tied to TRK Cable TV, suggesting the operator is a lone actor in an Eastern European, Russian-speaking area.

CyberArk noted that weaknesses in the panel and cookie handling exposed customer data and that similar flaws in other malware services could let researchers and law enforcement gather actionable intelligence, as stated in their report.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Hoskinson: Midnight Mainnet March, Not for ‘Privacy Maxis’

Cardano founder Charles Hoskinson dismissed targeting privacy-focused communities for Midnight's launch.The new privacy blockchain...

Intel Rebounds 2.5% on AI Bet, Earnings Beat

Intel stock jumped 2.5% to $48.29, rebounding from a recent sharp decline driven by...

Coinbase Launches AI-Agent Wallet With Secured Keys

Coinbase launched a wallet built specifically for AI agents on its Base Network, aiming...

Coinbase Launches AI Agent Wallets

Coinbase programmers revealed on Wednesday that the company is launching crypto wallet infrastructure to...

BlackRock Sees Asian Crypto ETF Boom Unleashing Trillions

A 1% crypto allocation from Asia's $108 trillion household wealth could spark nearly $2...

Must Read

Ethereum Hosting: TOP 10 Companies to Buy Hosting With Ethereum

If you are looking for Ethereum Hosting, you've hit the jackpot. In this article, we will present the 10 Best companies to buy hosting...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!