Beyond the Radar: Join GigaOm and Cynet May 6th

WhoUser Stealer Blog

The Browser Threat Vector: Lessons from the WhoUser Infostealer

Subscribe to get the latest updates and resources

Introduction

For years, security teams focused on securing endpoints, hardening networks, and patching operating systems. Browsers, by contrast, were treated as productivity tools — inherently somewhat risky, but not the primary battlefield. In 2026, the browser has become the most valuable credential vault on any employee’s machine, and threat actors have adapted accordingly.

The WhoUser infostealer, analyzed by Cynet’s CyOps CTI team in the March 2026 Cyber Threat Intelligence Report, is a textbook example of what modern browser-targeting malware looks like. But it is far from unique and reflects a broader, accelerating trend that every security team needs to understand.

The Scale of the Problem

Before examining WhoUser specifically, it is worth understanding the scale of browser-based credential theft in 2026. A database discovered in January 2026 and reported by IT Security Guru contained 149 million unique login-password pairs, compiled entirely from infostealer operations targeting browser credential stores. The database included 48 million Gmail accounts, 17 million Facebook accounts, and hundreds of thousands of financial and cryptocurrency accounts.

BleepingComputer has reported extensively on the evolution of infostealer campaigns, noting that modern infostealers have expanded credential theft far beyond usernames and passwords. Today’s tools harvest session cookies, authentication tokens, autofill data, and payment card information, all of which are stored in browser databases that most employees never think about.

Infosecurity Magazine also documented the emergence of Storm, a new infostealer in early 2026 that decrypts credentials server-side rather than on the victim’s machine — an innovation specifically designed to evade endpoint detection tools that watch for local database access. The article notes that one compromised employee browser can hand an attacker authenticated access to SaaS platforms, internal tools, and cloud environments without ever triggering a password-based alert.

Inside WhoUser: A Technical Walkthrough

WhoUser was discovered advertised on a Turkish-speaking surface-web hacking forum and analyzed by Cynet’s CyOps researchers. Written in C++ and compiled as a 64-bit Windows executable, the malware is promoted as an advanced data-stealing tool with browser extraction, Discord token collection, and Telegram-based exfiltration capabilities.

Advertisement for the WhoUser infostealer observed on a Turkish-speaking surface-web hacking forum.

Anti-Analysis Techniques

WhoUser immediately checks whether it is running in a debugging or virtual environment using CheckRemoteDebuggerPresent and IsDebuggerPresent — standard anti-analysis techniques that allow the malware to alter behavior or exit entirely if it detects a sandbox.

Browser Credential Harvesting

The core credential-theft capability targets Chromium-based browsers including Google Chrome, Microsoft Edge, and Opera GX. WhoUser accesses browser Local State files and LevelDB storage to extract the encryption keys needed to decrypt stored credentials, cookies, and authentication tokens. Hardcoded SQL queries in the binary target the credit_cards table directly, retrieving card numbers, cardholder names, expiration dates, and CVC values.

SQL queries targeting browser credit card databases embedded in the malware.

What makes this especially notable is WhoUser’s use of ChromeElevator — an open-source utility dropped as RuntimeBroker_ce.exe — to bypass Chromium’s App-Bound Encryption (ABE). ABE was introduced in Chrome 127 specifically to make local credential theft harder by binding decryption keys to the browser process. WhoUser’s use of ChromeElevator shows that attackers are actively developing and deploying countermeasures as defenses evolve.

Discord Token Harvesting

Beyond browser data, WhoUser scans AppData directories associated with Discord and Discord Canary installations, targeting the LevelDB databases that store authentication tokens. These tokens can provide persistent access to Discord accounts even after password changes, making them valuable both directly and as a social engineering vector.

Clipboard Monitoring

WhoUser monitors clipboard content in real time using Windows clipboard APIs. This captures passwords copied from password managers, cryptocurrency wallet addresses, one-time authentication codes, and any other sensitive content a user copies during a session.

Persistence and Exfiltration

The malware establishes persistence by creating a scheduled task named MicrosoftEdgeUpdateTaskMachine — designed to blend in with legitimate Microsoft Edge update tasks and avoid raising suspicion. Collected data is compressed into a ZIP archive named after the victim’s hostname and username, then exfiltrated. In the analyzed sample, exfiltration occurred via Discord webhook rather than Telegram, suggesting the sample was configured for that specific operator’s infrastructure.

The Broader Infostealer Economy

WhoUser is one data point in a much larger market. BleepingComputer reported on Torg Grabber, a new infostealer active from December 2025 through early 2026 that targets 728 cryptocurrency wallet extensions, 103 password manager extensions, and 25 Chromium-based browsers — with new command-and-control servers registered every week.

Cynet’s 2025 year-in-review analysis found that credential theft has become the dominant initial access vector for downstream ransomware and fraud operations, with infostealers feeding directly into ransomware affiliate programs. Stolen credentials are an important part of a cyber cartel’s asset portfolio, the entire criminal supply chain.

What Defenders Should Do

Browser security cannot remain an afterthought. Based on the WhoUser analysis and the broader infostealer landscape, organizations should take the following concrete steps:

  • Do not rely on browser-native password managers for high-value enterprise accounts. Browsers store credentials in predictable, well-documented locations that infostealers specifically target.
  • Deploy endpoint detection that monitors for suspicious browser database access, unsigned processes accessing Local State files, and tools like ChromeElevator or ChromeDriver launched from unexpected locations.
  • Monitor for scheduled tasks with names mimicking Microsoft services (such as MicrosoftEdgeUpdateTaskMachine) created by non-standard parent processes.
  • Shorten session lifetimes for sensitive applications and enforce re-authentication for high-risk actions. Stolen session cookies have a limited window of value — reducing session duration limits the damage.
  • Treat any infostealer infection as both a malware incident and an identity incident. Review OAuth grants, SSO integrations, and mailbox forwarding rules — attackers routinely establish persistence through these channels after initial access.
  • Search for unusual outbound HTTPS traffic to Telegram Bot API endpoints (api.telegram.org) and Discord webhook URLs from non-browser processes — both are common exfiltration channels for infostealers.

Related Posts

Inbox Rule Abuse: How Threat Actors Subvert Business Communication 
How Vect Ransomware Is Rewriting the RaaS Affiliate Playbook
March 2026 Cyber Threat Intelligence: Vect, WhoUser, Reynolds Ransomware and More
Geopolitics, Cyber-Terrorism, and the Stryker Attack: What Happened and What Comes Next 
Emerging Threat: Microsoft Teams Vishing Campaign Continues 

Keep Reading

Inbox image
Vect blog 2
sec-foundations-bg-4

Search results for: