This page provides comprehensive guidance on protecting systems and users from information stealing malware like Phantom and similar threats.
User-Level Protections
Password Management
Use a Password Manager
Use a Password Manager
Why browser-stored passwords are vulnerable:
- Browser passwords use Windows DPAPI for encryption
- Any process running as your user can decrypt them
- Stealers can extract passwords in seconds without admin rights
- Bitwarden (open source, cloud or self-hosted)
- 1Password (strong security, enterprise features)
- KeePassXC (offline, encrypted database)
Enable Multi-Factor Authentication (2FA)
Enable Multi-Factor Authentication (2FA)
Even if credentials are stolen, 2FA provides critical protection:Best 2FA methods (in order of security):
- Hardware security keys (YubiKey, Titan Key)
- Phishing-resistant
- Cannot be stolen remotely
- TOTP authenticator apps (Authy, Google Authenticator, Microsoft Authenticator)
- Better than SMS
- Still vulnerable if device is compromised
- SMS codes (least secure, but better than nothing)
- Vulnerable to SIM swapping
- Use only if no other option available
Cryptocurrency Protection
Use Hardware Wallets
Software wallets (Exodus, Electrum, MetaMask) store private keys on your computer, making them vulnerable to stealers.Hardware wallet benefits:
- Private keys never leave the device
- Requires physical confirmation for transactions
- Immune to software-based theft
- Ledger Nano S/X
- Trezor Model T
- BitBox02
Secure Software Wallets
If you must use software wallets:
- Keep only small amounts for daily use
- Use password-protected keystores
- Enable wallet encryption features
- Store recovery phrases offline (never digital)
- Use dedicated device for crypto transactions
File Storage Best Practices
Sensitive File Protection
Sensitive File Protection
Stealers often target common locations like Desktop and Documents:Protection strategies:
- Encrypt sensitive files using tools like:
- VeraCrypt (encrypted containers)
- BitLocker (Windows built-in)
- 7-Zip with AES-256 encryption
- Avoid storing on Desktop/Documents:
- Use dedicated encrypted folders
- Store in cloud with zero-knowledge encryption (Tresorit, Proton Drive)
- Sensitive file types to protect:
- SSH private keys
- PGP/GPG keys
- Cryptocurrency recovery phrases
- Password manager databases
- API keys and tokens
System-Level Protections
Endpoint Detection & Response (EDR)
EDR solutions provide behavioral detection that can catch stealers even when traditional antivirus fails.
Enterprise EDR Solutions
Enterprise EDR Solutions
Recommended EDR platforms:
- Microsoft Defender for Endpoint
- Behavioral monitoring
- AMSI integration
- Credential Guard support
- CrowdStrike Falcon
- AI-powered threat detection
- Blocks credential access patterns
- SentinelOne
- Autonomous response
- Rollback capabilities
- Carbon Black
- Deep process inspection
- File access monitoring
- File system access monitoring
- DPAPI call hooking
- Network traffic inspection
- Memory protection
- Behavioral analysis
Home/SMB Solutions
Home/SMB Solutions
For individual users and small businesses:
- Windows Defender (built-in, continuously improving)
- Enable real-time protection
- Enable cloud-delivered protection
- Enable automatic sample submission
- Malwarebytes Premium
- Anti-exploit protection
- Ransomware protection
- Web protection
- ESET Internet Security
- Banking & payment protection
- Network attack protection
- UEFI scanner
Windows Security Hardening
Enable Credential Guard
Windows Credential Guard protects against credential theft:Requirements:
- Windows 10 Enterprise/Education or Windows 11
- UEFI firmware
- Virtualization extensions enabled
Enable AMSI Protection
Anti-Malware Scan Interface (AMSI) helps detect stealer payloads:
- Ensure AMSI is enabled (default in Windows 10/11)
- Keep Windows updated to patch AMSI bypasses
- Monitor for VirtualProtect calls on amsi.dll
Application-Level Hardening
Browser Hardening
Browser Hardening
Reduce attack surface and limit stealer effectiveness:Chrome/Edge/Brave:
- Don’t save passwords in browser (use password manager instead)
- Regularly clear browsing data
- Disable autofill for sensitive information
- Use browser profiles to isolate sensitive activities
- Enable “Safe Browsing” protection
- Use master password feature
- Disable password save prompts
- Enable Enhanced Tracking Protection
- Consider using Firefox containers
Discord/Telegram Security
Discord/Telegram Security
Protect messaging app tokens:Discord:
- Enable 2FA on your account
- Log out when not in use (clears some tokens)
- Regularly change your password
- Monitor authorized apps in settings
- Use Telegram’s “Recent sessions” to monitor active devices
- Enable two-step verification
- Set auto-delete for sensitive conversations
- Use secret chats for sensitive communications
Network-Level Protections
DNS Filtering
DNS Filtering
Block exfiltration endpoints at DNS level:Enterprise solutions:
- Cisco Umbrella
- Cloudflare Gateway
- Quad9 (free)
- Pi-hole (self-hosted)
- NextDNS
- AdGuard DNS
- Newly registered domains
- File sharing services
- Webhook/bot API endpoints (if not needed)
Firewall Rules
Firewall Rules
Configure outbound firewall rules to limit exfiltration:
- Block outbound connections from suspicious locations (Temp, AppData)
- Whitelist approach for critical systems
- Monitor and alert on large outbound transfers
- Block common C2 and webhook endpoints
User Education
Technical controls are essential, but user awareness is the first line of defense.
Recognize Social Engineering
Stealers are typically delivered through:
- Fake software downloads (cracks, keygens, cheats)
- Malicious email attachments
- Trojanized legitimate software
- Discord/Telegram malware
- Fake browser extensions
- Software from unofficial sources
- Requests to disable antivirus
- Unexpected executable attachments
- Too-good-to-be-true offers
Safe Download Practices
- Download software only from official websites
- Verify file signatures when available
- Check VirusTotal for suspicious files
- Be suspicious of .exe files from untrusted sources
- Don’t run software that requires disabling AV
Monitoring & Detection
Event Log Monitoring
Event Log Monitoring
Monitor Windows Event Logs for stealer indicators:Key event IDs:
- 4688: Process creation (track new processes)
- 4663: File access (monitor browser data directories)
- 4657: Registry modification (persistence detection)
- 5157: Network connection blocked (firewall blocks)
- 4104: Script block logging
- 4103: Module logging
File Integrity Monitoring
File Integrity Monitoring
Monitor critical browser files for unauthorized access:
%LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data%LOCALAPPDATA%\Microsoft\Edge\User Data\Default\Login Data%APPDATA%\Discord\Local Storage\leveldb\
- OSSEC
- Tripwire
- Windows File Integrity Monitoring
Defense Summary
Critical protections:- Use password managers, not browser password storage
- Enable 2FA on all critical accounts
- Use hardware wallets for cryptocurrency
- Deploy EDR on all endpoints
- Keep systems and software updated
- Educate users on social engineering
- Monitor for suspicious behavior
- Have incident response plan ready
Remember: The most sophisticated technical defenses can be undermined by a single user clicking a malicious link. Combine technical controls with user education for maximum effectiveness.