REMUS infostealer campaign shifts fast toward session theft

REMUS MaaS – A detailed look at REMUS posts from February 12 to May 8, 2026 shows the infostealer operation being marketed and updated with an unusually software-like cadence—starting with browser credential and cookie theft, then rapidly expanding into session continuity
When REMUS first appeared in the underground. its operator sold it like a product: reliable. easy to use. and built for fast payoff.. But the flurry of posts spanning February 12 to May 8. 2026. as tracked by Flare researchers across 128 messages tied to the REMUS underground operation. show something more ambitious happening underneath the marketing—rapid iteration aimed at making the malware behave less like a one-time stealer and more like an operational platform.
The dataset built this picture by following what the actor published in the dark community: advertisements. update logs. feature announcements. operational discussions. and customer-facing communications.. Instead of presenting a finished malware package. the operator kept pushing changes—advertising improvements. adding new collection capabilities. and refining delivery and management workflows over just a few months.
That commercial push began in February 2026, when the tone was strongly promotional and customer-oriented.. Early posts focused on positioning REMUS as “reliable” and “easy-to-use. ” highlighting browser credential theft and cookie collection. along with Discord token theft and Telegram delivery. plus basic log management.. In one of the earliest entries. the operator claimed: “With good crypting and a dedicated intermediary server. the callback rate is ~90%.” Other early messaging leaned even harder on usability and support. including a pitch of “24/7 support” and a feature description that framed the operation as “simple enough that even a child can figure it out.”
By March 2026, the campaign’s most active development period was underway.. The operator added restore-token functionality. expanded log handling. introduced worker tracking. rolled out statistics pages. added duplicate-log filtering. and improved Telegram delivery workflows.. Posts during this stage spent more time on operational visibility and campaign management than on theft mechanics. including adding worker nicknames to log tables and statistics views. and improving loader execution visibility so operators could better understand failed infections.
In April 2026, the focus sharpened further toward session continuity and browser-side authentication artifacts.. The operator added SOCKS5 proxy support. improved token restoration. and introduced anti-VM toggles. while also expanding gaming-platform targeting and related collection.. A standout update explicitly stated: “Added IndexedDB collection for 1Password and LastPass extensions.” Other posts referenced Bitwarden-related searches.. Across these messages. the emphasis tilted toward authenticated sessions and browser-side storage—restore workflows and IndexedDB—rather than presenting the product purely as a way to steal standalone credentials.
Then in early May 2026, the pattern looked less like expansion and more like stabilization.. The remaining posts in the dataset referenced restore improvements. bug fixes. collection optimizations. and continued adjustments to delivery and management functionality—suggesting the operator was shifting from rapid feature expansion toward making the platform steadier.
At the technical level. public reporting has treated REMUS as closely connected to Lumma Stealer. and those similarities mattered: researchers described REMUS as a 64-bit infostealer sharing multiple Lumma-like traits. including anti-VM checks. browser-focused credential theft. and browser encryption bypass techniques.. Yet the underground posts show the storyline running on a different track—where the operator repeatedly pushed versioned updates. troubleshooting and statistics improvements. and customer-facing support in a way that resembles legitimate software development cycles. not just the release of a static malware build.. In that same thread. early messaging about operational reliability (including the “~90%” callback rate claim tied to crypting and an intermediary server) lines up with later additions like restore-token workflows and session persistence features.
One theme threads through nearly every stage of the operation: session theft as a selling point, not a side effect.. The posts repeatedly emphasized cookie collection. token handling. browser sessions. and proxy-assisted restoration. with authenticated access continuity presented as part of REMUS’s core value from the earliest days.. The operator’s wording and feature focus framed session preservation as something buyers could rely on—especially through the repeated attention to “Restore” improvements. proxy compatibility. and support for multiple proxy types during token restoration workflows.
The campaign also tied that session value to the kinds of platforms where active sessions can carry real weight. including Discord. Steam. Riot Games. and Telegram-linked environments.. Combined with cookie collection and the restore function. the dataset points to a design intent: to preserve and operationalize authenticated access itself. rather than only collecting credentials and attempting logins later.
The late-stage evolution that stands out most is the shift toward password-manager-related collection.. By April 2026, the operator was advertising support tied to Bitwarden, 1Password, LastPass, and IndexedDB browser storage.. The posts also singled out IndexedDB—describing it via its role in modern browser extensions and applications that use local browser storage to retain data and session information.. Flare’s write-up is careful on what the posts alone can and cannot prove: they do not establish successful vault decryption or direct password-manager compromise by themselves.. But they do demonstrate that REMUS development was moving toward collecting browser-side storage associated with password-management ecosystems.
Underneath the feature list, the operation also looked more structured than a typical one-person malware release.. Across the analyzed posts. the operator kept publishing versioned updates. bug fixes. feature expansions. troubleshooting improvements. statistics enhancements. and operational visibility refinements.. Several messages also implied a multi-operator environment through references to workers. statistics dashboards. management visibility. loader monitoring. and log categorization—elements that mirror how MaaS ecosystems often break work into specialized roles. separating development. infrastructure. delivery. and monetization.
For Flare’s researchers, the takeaway is not just that REMUS can steal.. It’s that the operation behind it is built to keep running—iterating quickly. refining how it manages results. and increasing the value of what it captures by leaning into authenticated sessions and browser-side artifacts.. The posts chart a move from February’s promotional targeting of browser credentials. cookies. and messaging platform delivery. through March’s operational tooling. into April’s session continuity and password-manager-adjacent collection. and finally into early May’s stabilization work.. In the end. REMUS emerges in these underground traces as a malware campaign that behaves like a product cycle—one designed for persistence. scalability. and longer-term monetization workflows.
REMUS infostealer MaaS session theft cookies token restoration password managers Bitwarden 1Password LastPass IndexedDB SOCKS5 proxy Lumma Stealer Discord Telegram