Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » News » Cyber Threats » Dark Web Threat Actors Use UAC Bypass to Spread Anivia Stealer

Dark Web Threat Actors Use UAC Bypass to Spread Anivia Stealer

By:
Last updated:October 29, 2025
Human Written
  • A new info-stealing malware referred to as Anivia Stealer has popped up for sale on the dark web.

  • The malware doesn’t bother asking for permission – it just slips right past Windows User Account Control to grab higher privileges on the target’s system.

  • Once it gains access, the malware hunts down passwords, crypto wallets, and all kinds of personal data, handing it over to its buyers.

New Anivia Stealer Threatens Windows Users with Sneaky UAC Bypass

A new nasty piece of Microsoft Windows malware is making the rounds, and cybercriminals can now rent it easily.

This threat specifically targets Windows computers. Its main trick is slipping past your defenses.

New Threat Emerges on the Dark Web

Anivia Stealer, the latest info-stealing malware, is now for sale on the dark web, and it’s not messing around. The creator, who goes by “ZeroTrace,” is pushing it hard, offering it as a malware-as-a-service deal. Basically, anyone with a bit of cash can rent it.

The stealer is built using the C++17 programming language. Its most alarming feature is an automatic User Account Control bypass. This lets it gain admin rights on your system quietly.

Anivia Stealer is so smooth and clever that it bypasses Windows User Account Control straight away and runs with elevated privileges. It is compatible with everything from Windows XP systems to the latest Windows 11 systems.

What Does This Stealer Do?

Anivia Stealer is a powerful and efficient data thief. It is a standalone executable. That means it needs no extra files to run. This makes it very stealthy.

It targets a wide range of sensitive information. The malware hunts for credentials stored in your web browsers. Once it’s in, it hunts for passwords, crypto wallets, system data, authentication tokens, LSA secrets – the whole lot.

But it doesn’t stop there – even your WhatsApp session data isn’t safe. It can take screenshots of your active desktop. It also gathers detailed system information. This gives attackers a full picture of your device and activities.

Buyers get access to a web-based admin panel. This panel includes a world map. It shows the real-time location of every infected victim. This makes monitoring their attacks simple.

Easy Access for Criminals

The developer is making this tool accessible to many criminals. ZeroTrace offers Anivia through a subscription model. This is merely the most recent example in a long history where malware is offered as a service.

As for the pricing, it’s pretty straightforward – €120/month, €220 for two months, and €320 for 3 months. Not exactly expensive or hard to reach for prospective hackers. For €680, it is a lifetime purchase.

This tiered pricing lowers the barrier to entry. Even low-level threat actors can now use advanced tools. These were once only for well-funded groups.

This isn’t ZeroTrace’s first project. Security researchers link them to earlier stealers. These include Raven Stealer and ZeroTrace Stealer. Code analysis suggests Anivia might be a rebranded version of their old work.

Threat actors often rebrand their malware. This helps them evade detection by security software. It also creates fresh buzz in the criminal marketplace.

How to Protect Yourself

So how do you stay safe? It’s all about acquiring a bit of tech know-how and applying caution at all times. Organizations should strengthen their endpoint monitoring. They need to watch for UAC bypass attempts.

Applying application safe list policies is a great defense. So is restricting user privileges. Keeping all Windows systems fully patched is absolutely essential.

For everyone, be extra careful with email attachments. Don’t download weird files or click on random links. That’s how malware like this usually gets in.

Anivia Stealer is getting a lot of attention right now, and honestly, it just proves there’s a huge demand for ready-to-use hacking tools. Staying sharp and maybe a bit suspicious online actually makes a difference.

Share this article

About the Author

Joahn G

Joahn G

Cyber Threat Journalist

Joahn is a cyber threat journalist dedicated to tracking the evolving landscape of digital risks. His reporting focuses on ransomware gangs, data breach incidents, and state-sponsored cyber operations. By analyzing threat actor motives and tactics, he provides timely intelligence that helps readers understand and anticipate the security challenges of tomorrow.

View all posts by Joahn G >
Comments (0)

No comments.