Venom Stealer turns ClickFix pages into a full data theft pipeline, researchers say


Venom Stealer is a malware-as-a-service tool that uses ClickFix social engineering pages to trick victims into launching the infection themselves. BlackFog says the platform goes beyond basic password theft by combining staged delivery, credential harvesting, wallet targeting, and continued post-infection monitoring in one operator-controlled workflow.

According to BlackFog, the malware is sold under the handle “VenomStealer” through a subscription model that ranges from $250 per month to $1,800 for lifetime access. The same report says the service includes Telegram-based licensing, a 15% affiliate program, and a native C++ payload compiled for each operator from the web panel.

The delivery method is what makes the campaign especially effective. BlackFog says operators get ready-made ClickFix templates for Windows and macOS, including fake Cloudflare CAPTCHA pages, fake OS update prompts, fake SSL certificate warnings, and fake font install pages. Those lures try to get the victim to open Run on Windows or Terminal on macOS, paste a command, and execute it manually.

Venom Stealer’s Advertisement (Source – BlackFOG)

Why Venom Stealer stands out

Many infostealers focus on grabbing saved passwords and session data, then exiting. BlackFog says Venom keeps working after the first theft by maintaining what it describes as a continuous exfiltration pipeline rather than a one-time collection event.

BlackFog also says the malware immediately targets Chromium- and Firefox-based browsers, collecting saved passwords, cookies, browsing history, autofill data, and cryptocurrency wallet material from every profile it can reach. The report adds that system fingerprinting and browser extension inventories are gathered as well, giving operators a broad picture of the infected host.

The macOS ClickFix Delivery Panel (Source – BlackFOG)

Another notable claim in the report involves Chrome credential access. BlackFog says Venom abuses the CMSTPLUA COM interface to elevate privileges silently and retrieve the key needed to decrypt Chrome’s v10 and v20 credential storage without showing a UAC prompt.

How the post-infection monitoring works

BlackFog says Venom does not stop after the first data dump. Instead, it stays on the machine and watches Chrome’s Login Data file every 30 seconds so it can capture newly stored credentials after the initial infection.

That means the risk continues even after the victim notices something is wrong. If a user changes passwords on the same compromised machine and Chrome saves the new credentials, BlackFog says Venom can steal those updated secrets as well.

Session Listener Lifecycle (Source – BlackFOG)

The report also says wallet theft is heavily automated. BlackFog claims any discovered cryptocurrency wallet data is sent to a server-side GPU cracking engine, and that the tool targets wallet ecosystems including MetaMask, Phantom, Exodus, and Electrum across nine blockchain networks. A March 9 update reportedly added a file password and seed finder that scans the local filesystem for wallet recovery material.

Venom Stealer at a glance

ItemReported detail
Malware familyVenom Stealer
Business modelMalware-as-a-service
Pricing$250/month to $1,800 lifetime
Delivery methodClickFix social engineering pages
Main lure typesFake CAPTCHA, fake OS update, fake SSL error, fake font install
Main targetsBrowser credentials, cookies, autofill, wallet data
Persistence behaviorContinues monitoring Chrome’s Login Data file
Claimed update paceMultiple updates in March 2026

Source basis: BlackFog research.

What defenders should focus on

  • Train users to treat any page that asks them to paste commands into Run, PowerShell, Command Prompt, or Terminal as highly suspicious. BlackFog says Venom relies on that exact interaction model.
  • Restrict PowerShell where appropriate and consider limiting access to the Run dialog for standard users through Group Policy. These are mitigation steps BlackFog specifically recommended.
  • Watch outbound traffic closely, because BlackFog says the threat depends on continuous data leaving the endpoint rather than a single short exfiltration burst.
  • Treat a host as compromised until rebuilt if Venom is suspected, since the reported 30-second polling of Chrome’s credential store means password resets on the same device may not help. This is an inference based on BlackFog’s described behavior.
  • Review the sample text you provided here for comparison:

FAQ

What is Venom Stealer?

Venom Stealer is a malware-as-a-service platform that BlackFog says combines ClickFix delivery with credential theft, wallet targeting, and ongoing post-infection data collection.

What is ClickFix in this case?

In BlackFog’s description, ClickFix refers to fake web pages that trick users into launching commands themselves, which helps the malware avoid some behavior-based defenses because the action appears user-initiated.

Why is Venom Stealer more dangerous than a basic infostealer?

BlackFog says it does not just steal data once. It keeps monitoring the machine for new credentials and adds wallet-focused modules that support broader financial theft.

Which platforms does it target?

The report says it supports both Windows and macOS for ClickFix delivery, and steals from Chromium- and Firefox-based browsers after infection.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages