You are exploring the Free preview. To unlock full read-only access to all public profiles and in-app notifications, create a free research account. For analyst / premium plans capabilities (editing, advanced tabs, exports), please contact us

Threat Actor Characterization

You’re viewing the read-only version. Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
DotStealer

DotStealer

ID: 2cd1f633e008625ef383f152120eff0b69255
Crimeware Spyware/Stealer
Threat types: Malware
Unknown
Updated: 2026-03-30
Created: 2026-03-30
Progress: 75% Completeness: 68% Freshness: 90%
Operation zone:
Aliases Limited alias preview
No aliases registered.
Actor Network Graph
Open Network Graph
Read-only preview for anonymous visitors. Sign in with a free Research account for full workspace.
MITRE ATT&CK®

No techniques mapped yet.
Strategic Intelligence
Limited preview
Last updated: 2026-03-30T04:25:43+00:00

DotStealer — Telegram-Centric Information Stealer / Malware-as-a-Service Offering

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Category: Malware / Information Stealer / MaaS-like builder offering - Origin: Unknown; likely transnational cybercrime ecosystem with operator-facing channels tied to @shinyenigma

Author: iQBlack CTI Team


Executive Summary

DotStealer is an information-stealing malware family positioned closer to an operator-friendly commercial stealer/builder than to a one-off commodity sample. Public reporting from 2024 onward describes a Windows-focused stealer that collects browser credentials, cookies, credit-card data, local files, and system information, and that exfiltrates the resulting data through Telegram infrastructure. More recent public traces suggest the family evolved into “DotStealer 2.0/2.1”, adding richer surveillance and operator conveniences such as panel support, app-bound browser key handling, camera/audio capture claims, and cloud-assisted delivery or upload patterns.


The most stable narrative thread is not a tightly documented victim campaign but an ecosystem one: DotStealer appears marketed and maintained in public-facing infrastructure associated with the handle @shinyenigma, with adjacent overlap into the Millenium RAT ecosystem. This makes DotStealer relevant not only as a malware family but as a commercialized access-and-data-theft capability that lowers the barrier for less sophisticated operators. Confidence is medium overall because the public footprint is meaningful but still thinner than for older, more heavily tracked stealers.

Full strategic intelligence is available in Analyst and Premium plans.
Executive Analyst Brief for CISO
Saved Limited preview

Executive Analyst Brief for CISO — DotStealer

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

Upgrade to access the full executive brief.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Executive brief now
Saved successfully.
Hunting Playbook
Saved Limited preview

Hunting Playbook — DotStealer


Upgrade to access the full hunting playbook.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook now
Saved successfully.
IOC Appendix
Saved Limited preview
Last updated: 2026-03-30T04:31:29+00:00

IOC Appendix — DotStealer

Classification: Unclassified / Open Source Intelligence (OSINT) — TLP:WHITE

More IOC context for Research. Full appendix for Analyst and Premium plans.
IOC Appendix now
Saved successfully.
OSINT Library
Saved Limited preview
Last saved: 2026-03-30T04:32:04+00:00

OSINT Library — DotStealer


2024-02-08 — K7 Labs — “Unmasking the Dot Stealer”

Full OSINT references available for Research / Analyst.
OSINT Library now
Saved successfully.
Social Medial & Communication
SOCMINT integrated: 0/2

Address Verification SOCMINT
milleniumrat.online/dot******* Restricted Not integrated
Address Verification SOCMINT
github.com/shi****************** Restricted Not integrated
Notes: preview mode hides sensitive social/contact details.
Reference Images/Associated Evidence Limited

Showing 1–1 of 1 images
Reference image Free Preview
Reference image