Mar 19, 2026 · 5 min read
This $30 Malware Subscription Steals Everything on Your Computer
DarkCloud harvests browser passwords, email credentials, crypto wallets, and corporate logins—and anyone can buy it on Telegram.
Cybercrime as a Service
For $30 a month, anyone with a Telegram account can subscribe to DarkCloud—a credential harvesting malware that strips passwords, financial data, and corporate credentials from infected computers. The tool is marketed as "surveillance software" or "password recovery," but its actual purpose is comprehensive data theft at scale.
Flashpoint, the threat intelligence firm that tracked DarkCloud's evolution, assessed it as "a potent entry level threat that can provide adversaries with the keys to an entire corporate network through harvested credentials." The $30 price point puts it within reach of virtually any aspiring attacker—no technical expertise required.
What It Steals
DarkCloud does not target one thing. It targets everything:
- Browser data: Login credentials, cookies, saved credit cards, and cached passwords from Chrome, Edge, Firefox, Brave, Opera, Vivaldi, and Yandex. It uses regex based identification to categorize stolen card types.
- Email clients: Harvests contacts and saved credentials from Outlook, Thunderbird, FoxMail, eM Client, and MailMaster.
- Cryptocurrency wallets: Targets Zcash, Armory, Bytecoin, Exodus, Electrum, MetaMask (Chrome and Edge extensions), Atomic, Guarda, and Coinomi.
- FTP and VPN credentials: Retrieves and decrypts stored passwords from FileZilla, WinSCP, and NordVPN.
- Files: Grabs documents from Desktop, Documents, and Favorites directories—targeting .txt, .pdf, .doc, and .xls files.
- Live monitoring: Logs keystrokes and captures clipboard contents in real time.
Stolen data is staged locally under Windows' AppData directory, then exfiltrated through four channels: SMTP email with SSL/TLS encryption, Telegram API, FTP, or a PHP based web panel. The redundancy means even if one channel is blocked, the stolen data still gets out.
How It Gets In
The infection chain starts with a phishing email containing a RAR archive, a malicious ZIP file, or a deceptive PDF disguised as an Adobe Flash Player notification. Some campaigns host the malicious files on legitimate file sharing services to bypass email filters.
The technical execution is sophisticated despite the low price. DarkCloud uses an AutoIt based dropper with heavy obfuscation, extracts encrypted shellcode from embedded resources, modifies memory protections to execute the payload, and establishes persistence through Windows registry RunOnce keys with randomized names.
The malware is written in Visual Basic 6.0—a language so old that modern security tools often overlook its runtime components. This is deliberate. By relying on legacy Windows libraries, DarkCloud evades heuristic detection methods designed for contemporary frameworks.
Why It Matters for Enterprises
DarkCloud is not just a consumer threat. One infected employee laptop can expose corporate email credentials, VPN access, internal document contents, and browser saved passwords to corporate portals. From there, attackers can pivot into corporate networks, steal additional data, or deploy ransomware.
The malware also includes anti analysis features that detect common security tools—WinDbg, Fiddler, Wireshark, Process Explorer, VMWare Tools—and checks for sandbox environments by verifying minimum hardware requirements. If it detects a security researcher's environment, it simply does not run.
Flare Research estimates that if current trends hold, one in five infostealer infections could yield enterprise credentials by Q3 2026, with 3.9 billion credentials already compromised across 4.3 million devices in 2024 alone.
How to Protect Yourself
Infostealers like DarkCloud succeed because they exploit the most common security weakness: people clicking things they should not. But the defenses are straightforward:
- Do not open unexpected attachments—especially ZIP, RAR, or PDF files from unknown senders. This remains the primary infection vector.
- Use a password manager instead of saving passwords in your browser. Browser stored credentials are the first thing infostealers harvest.
- Enable hardware security keys for critical accounts. Even stolen passwords are useless without the physical key.
- Keep software updated. DarkCloud exploits legacy components that patches address.
- Monitor for credential exposure through services like Have I Been Pwned or your organization's threat intelligence feeds.
The barrier to entry for cybercrime has never been lower. When a complete credential theft toolkit costs less than a streaming subscription, the only realistic defense is assuming your credentials will eventually be stolen—and building your security around that assumption. The threat extends beyond desktops—the Perseus Android malware scans notes apps to steal passwords that users store in plain text, targeting the same credentials through a completely different attack surface.