VYPR
researchMay 15, 2026· 1 source

REMUS Infostealer Evolves to Prioritize Session Theft and MaaS Model

The REMUS infostealer has rapidly evolved to focus on session theft and operates as a malware-as-a-service (MaaS), making stolen authentication tokens more valuable than passwords, according to Flare.

The REMUS infostealer has evolved significantly, with a new focus on session theft and a "malware-as-a-service" (MaaS) model, according to research by Flare. This shift indicates that stolen browser sessions and authentication tokens are becoming more valuable to cybercriminals than traditional stolen passwords. REMUS is designed for scalability and operational efficiency, making it a potent tool for threat actors.

REMUS targets users by stealing session cookies and authentication tokens, which allow attackers to bypass the need for passwords altogether and gain direct access to user accounts on various platforms. This method is particularly effective against websites and services that rely heavily on session-based authentication. The MaaS model implies that the developers of REMUS are leasing their malware to other criminals, increasing its reach and impact.

Organizations and individuals should be aware of the increased threat posed by session hijacking. Implementing multi-factor authentication (MFA) wherever possible is crucial, as it adds an extra layer of security even if session tokens are compromised. Regularly clearing browser cookies and ensuring endpoint security solutions are up-to-date can also help mitigate the risks associated with infostealers like REMUS.

Synthesized by Vypr AI