top of page

A Stealer-as-a-Service Panel Hiding Behind Cloudflare

  • Writer: Patrick Duggan
    Patrick Duggan
  • Dec 19, 2025
  • 4 min read

--- title: "We Found stealer.su: A Live Malware-as-a-Service Panel Nobody's Talking About" slug: stealer-su-maas-panel-discovered date: 2025-12-19 author: Patrick Duggan tags: [threat-intelligence, malware, stealer, maas, osint, russia, stix] category: Threat Intelligence featured: true story_density_target: 120.9 ---


December 19, 2025 - While sweeping our threat feeds for fresh IOCs, PreCog flagged something interesting: `stealer.su`. A domain so on-the-nose it almost sounds fake.


It's not fake. It's a live malware-as-a-service login portal. And nobody's talking about it.




The Discovery


First seen: December 18, 2025 at 09:40:29 UTC


Our PreCog Sweep - an automated OSINT harvester that pulls from ThreatFox, OpenPhish, and AlienVault OTX - flagged `stealer.su` as a novel IOC. Hours later, ThreatFox tagged it:



Type: domain
Description: Unknown Stealer - botnet_cc
BDE Score: 85 (high confidence malicious)


Then we found the login portal: `https://stealer.su/login`


A literal credential stealer control panel. Live. Operational. Accepting logins.




The Infrastructure


DNS Resolution



stealer.su → 172.67.170.252, 104.21.87.222


Both IPs are Cloudflare. The operators are using Cloudflare to hide their origin server - standard practice for malware infrastructure that wants to stay up.


Certificate Transparency


Checking crt.sh reveals:


| Certificate | Issuer | First Seen | |-------------|--------|------------| | *.stealer.su | Google Trust Services WE1 | Oct 10, 2025 | | *.stealer.su | Google Trust Services WE1 | Dec 8, 2025 |


A wildcard certificate. They're planning for subdomains. This isn't a throwaway domain - it's infrastructure.


WHOIS


The `.su` TLD is the Soviet Union legacy domain, administered by ROSNIIROS (Russian Institute for Development of Public Networks) in Moscow. Domain registration details are privacy-protected, but the TLD choice is telling.




Related Infrastructure


The same ThreatFox hunt that caught `stealer.su` pulled related stealer infrastructure:


| Domain | Type | Description | |--------|------|-------------| | stealer.su | domain | MaaS login portal | | xn--uck9ds92mmxh.net | domain | Payload delivery | | webmail.super77a.com | hostname | Payload delivery | | wap.aslyjx.com | hostname | Payload delivery | | yell.npaym.com | hostname | Payload delivery |


That punycode domain? It decodes to ゴミ屋敷.net - Japanese for "garbage house" or "hoarder house." Either the operators have a sense of humor, or their domain generator created accidental poetry.




What Is This?


Malware-as-a-Service (MaaS) panels like `stealer.su` are the backend for credential theft operations. The typical model:


1. Operator rents access to the panel 2. Operator deploys stealers via phishing/malvertising 3. Victims get infected, credentials exfiltrated 4. Credentials appear in the panel for the operator 5. Operator sells or uses the stolen data


The login portal at `/login` is where operators authenticate to access their stolen credential dashboard.




Why This Matters


1. It's Brazenly Named



• Operators confident in their infrastructure's resilience

• A relatively new operation still building reputation

• A honeypot (though ThreatFox's tagging suggests real malware association)


2. It's Behind Cloudflare


Cloudflare's abuse team is generally responsive, but takedowns take time. Meanwhile, the panel stays up.


3. It's Using Legitimate Certificate Authorities


Google Trust Services issued the wildcard cert. The infrastructure looks "legitimate" to automated systems.


4. Nobody's Reporting It


As of this writing, `stealer.su` has minimal coverage. Our PreCog Sweep caught it via ThreatFox correlation, but it hasn't hit mainstream threat intel feeds or security news.




The Evidence


Query Our Index



curl "https://analytics.dugganusa.com/api/v1/search?q=stealer.su"


IOC List



stealer.su
https://stealer.su/login
172.67.170.252
104.21.87.222
xn--uck9ds92mmxh.net (ゴミ屋敷.net)
webmail.super77a.com
wap.aslyjx.com
wap.sdkqgs.com
yell.npaym.com


STIX Feed


All IOCs available in our free STIX 2.1 feed:



curl "https://analytics.dugganusa.com/api/v1/stix-feed"




Recommendations



• Block `stealer.su` and associated infrastructure at your perimeter

• Monitor for DNS queries to `.su` domains generally (low legitimate traffic)

• Check logs for connections to 172.67.170.252 / 104.21.87.222 (note: Cloudflare IPs host many domains)



• Abuse report submitted



• This is why automated threat feed correlation matters. PreCog caught this 24 hours before we manually investigated. The machines are faster than us.




The Bigger Picture


We've published three threat intel posts in the last 24 hours:


1. Mintlify XSS Downstream Exploitation - 121 IOCs captured 38 days after disclosure 2. GitHub Hydra Factory - Discord stealer network mapped via stargazer analysis 3. This post - A MaaS panel nobody's talking about


All of this came from the same pipeline: automated harvesting → Meilisearch indexing → human pattern recognition → publication.


The threat landscape moves fast. Automated detection with human analysis is how you keep up.




Timeline


| Date | Event | |------|-------| | Oct 10, 2025 | First wildcard cert issued for *.stealer.su | | Dec 8, 2025 | Second cert issued (renewal or new) | | Dec 18, 2025 09:40 UTC | PreCog Sweep first detection | | Dec 18, 2025 11:50 UTC | ThreatFox tags as "Unknown Stealer - botnet_cc" | | Dec 19, 2025 | DugganUSA investigation and publication |




*We found a malware-as-a-service panel called stealer.su. It has a login page. It's behind Cloudflare. It's using the Soviet Union TLD. And until now, nobody was talking about it.*


*Come at us with facts, not feelings.*




Get Free IOCs


Subscribe to our threat intelligence feeds:


AlienVault OTX: https://otx.alienvault.com/user/pduggusa


STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed




Get Free IOCs

Subscribe to our threat intelligence feeds for free, machine-readable IOCs:

AlienVault OTX: https://otx.alienvault.com/user/pduggusa

STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page