Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

Brazil’s LofyGang resurfaces after 3 years with Minecraft LofyStealer campaign

Apple introduces cheaper option for App Store subscriptions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Brazil’s LofyGang resurfaces after 3 years with Minecraft LofyStealer campaign
Identity

Brazil’s LofyGang resurfaces after 3 years with Minecraft LofyStealer campaign

By April 28, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A cybercrime group of Brazilian origin has resurfaced after more than three years and organized a campaign targeting Minecraft players using a new stealer called LofyStealer (also known as GrabBot).

“This malware disguises itself as a Minecraft hack called ‘Slinky,'” Brazil-based cybersecurity firm ZenoX said in a technical report. “It exploits young users’ trust in the gaming scene by using the game’s official icon to induce spontaneous execution.”

We have high confidence that this activity is the work of the threat actor known as LofyGang. The attacker was observed leveraging typosquatting packages on the npm registry in 2022 to push stealer malware specifically to siphon credit card data and user accounts related to Discord Nitro, games, and streaming services.

The group is believed to have been active since late 2021, promoting its tools and services on platforms such as GitHub and YouTube, while contributing to underground hacking communities under the alias DyPolarLofy, and has compromised thousands of Disney+ and Minecraft accounts.

“Minecraft has been a target of LofyGang since 2022,” Acassio Silva, co-founder and head of threat intelligence at ZenoX, told The Hacker News. “They have leaked thousands of Minecraft accounts on Cracked.io under the alias DyPolarLofy. The current campaign is directly tracking Minecraft players through a fake ‘Slinky’ hack.”

The attack begins with a Minecraft hack and, when launched, triggers the execution of a JavaScript loader that is ultimately responsible for deploying LofyStealer (‘chromelevator.exe’). This loader is ultimately responsible for deploying LofyStealer (‘chromelevator.exe’) on the compromised host and runs directly in memory. Its purpose is to collect a wide range of sensitive data across multiple web browsers including Google Chrome, Chrome Beta, Microsoft Edge, Brave, Opera, Opera GX, Mozilla Firefox, and Avast Browser.

The collected data, including cookies, passwords, tokens, cards, and international bank account numbers (IBANs), is exfiltrated to a command and control (C2) server located at 24.152.36.[.]241.

“Historically, the main vector for this group has been the JavaScript supply chain, including typosquatting of NPM packages, starjacking (false references to legitimate GitHub repositories to exaggerate credibility), and payloads embedded in sub-dependencies to evade detection,” ZenoX said.

“The focus was the theft of Discord tokens, modification of the Discord client for credit card interception, and exfiltration via webhooks exploiting legitimate services (Discord, Repl.it, Glitch, GitHub, and Heroku) as C2.”

The latest development marks a departure from the previously observed tradecraft and a move towards a malware-as-a-service (MaaS) model with free and premium tiers, as well as a bespoke builder called Slinky Cracked used as a delivery vehicle for stealer malware.

This disclosure comes as threat actors increasingly exploit the trust associated with platforms like GitHub to host fake repositories that serve as fodder for malware families such as SmartLoader, StealC Stealer, and Vidar Stealer. Unsuspecting users are lured to these repositories through techniques such as SEO poisoning.

In some cases, attackers have been found to spread Vidar 2.0 through Reddit posts promoting fake Counter-Strike 2 game cheats, redirecting victims to malicious websites that deliver ZIP archives containing the malware.

“This information theft campaign highlights the ongoing security challenge of widely trusted platforms being exploited to distribute malicious payloads,” Acronis said in an analysis published last month. “By leveraging social trust and common download channels, attackers can often bypass traditional security solutions.”

This finding adds to a growing list of campaigns powered by GitHub in recent months.

It directly targets developers within GitHub and uses fake Microsoft Visual Studio Code (VS Code) security alerts posted through discussions to trick users into clicking on a link and installing malware. “GitHub discussions trigger email notifications for participants and observers, so these posts are also delivered directly to developers’ inboxes,” Socket said. “This extends the scope of the campaign beyond GitHub itself, making the alerts appear more legitimate.” They use spear-phishing emails to target Argentina’s judicial system and distribute compressed ZIP archives that use an intermediate batch script to retrieve a remote access Trojan (RAT) hosted on GitHub. Creating a GitHub account and an OAuth application, then opening an issue that mentions the targeted developer triggers an email notification that tricks the developer into authenticating the OAuth app, effectively allowing the attacker to obtain an access token. This issue is intended to create a false sense of urgency and alert users about unusual access attempts. Malicious GitHub repositories are used to distribute malicious batch script installers disguised as legitimate IT and security software, leading to the deployment of the TookPS downloader, which then initiates a multi-step infection chain to establish persistent remote access using SSH reverse tunnels and RATs such as MineBridge RAT (also known as TeviRAT). This activity is believed to be by Rift Brigantine (aka FIN11, Graceful Spider, TA505). Fake GitHub repositories disguised as AI tools, game cheats, Roblox scripts, phone number location trackers, and VPN crackers are used to distribute LuaJIT payloads that act as general-purpose Trojans as part of a campaign called TroyDen’s Lure Factory.

“The breadth of lure factories, including game cheats, developer tools, phone trackers, Roblox scripts, and VPN crackers, suggests that the attackers are optimizing for overall audience volume rather than precise targeting,” Netskope said.

“Defenders should treat GitHub-hosted downloads that combine renamed interpreters and opaque data files as high-priority triage candidates, regardless of how legitimate the surrounding repositories appear.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple introduces cheaper option for App Store subscriptions
Next Article Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

Related Posts

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

April 28, 2026

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

April 28, 2026

Why secure data movement is the Zero Trust bottleneck that no one talks about

April 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers have discovered a critical GitHub CVE-2026-3854 RCE flaw that can be exploited via a single Git push

Brazil’s LofyGang resurfaces after 3 years with Minecraft LofyStealer campaign

Apple introduces cheaper option for App Store subscriptions

VECT 2.0 ransomware irreversibly destroys files larger than 131KB on Windows, Linux, and ESXi

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.