Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Nvidia Triton bug causes unrecognized attackers to run code and hijack AI servers

Vietnamese hackers use PXA steelers to hit 4,000 IPS and steal 200,000 passwords worldwide

North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Vietnamese hackers use PXA steelers to hit 4,000 IPS and steal 200,000 passwords worldwide
Identity

Vietnamese hackers use PXA steelers to hit 4,000 IPS and steal 200,000 passwords worldwide

userBy userAugust 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 4, 2025Ravi LakshmananMalware/Browser Security

Cybersecurity researchers are turning their attention to a new wave of campaigns that distribute Python-based information steelers, known as Pyson-based information steelers.

According to a joint report published by Beazley Security and Sentinelone and shared with Hacker News, it is rated as the job of Vietnamese-speaking cybercriminals who monetize stolen data through a subscription-based underground ecosystem.

“The discovery incorporates a pipeline of cured command and controls that irritate trade leaps, more nuanced anti-analytical techniques, non-malicious decoy content, and a hardened pipeline of command and controls that attempt to irrigate and slow detection,” said security researchers Jim Walter, Alex Delamott, Francisco Donoso, Franche and Sam Meise.

Cybersecurity

The campaign has infected over 4,000 unique IP addresses across 62 countries, including South Korea, the US, the Netherlands, Hungary and Austria. Data captured via Steeler includes over 200,000 unique passwords, hundreds of credit card records, and over 4 million harvested browser cookies.

The PXA Stealer was first documented by Cisco Talos in November 2024 and was attributed to attacks targeting governments and educational institutions in Europe and Asia. You can harvest passwords, automatic browser fill data, cryptocurrency wallets, and information from financial institutions.

Data stolen by malware using Telegram is fed to crime platforms like Sherlock, the provider of Steeler Logs. There, downstream threat actors sprint through the Cybercriminal ecosystem on scale, purchasing information to stolen and infiltrate cryptocurrency.

The 2025 malware distribution campaign witnessed a steady tactical evolution using threat actors to fly DLL sideloading technology and elaborate staging layers under radar.

Malicious DLLs note that they perform the rest of the infection sequence, paving the way for steelers to unfold, but not before they take steps to show decoy documents such as copyright infringement notices to victims.

Identity Security Risk Assessment

Stealer is an updated version with the ability to extract cookies from Chromium-based web browsers by injecting DLLs into running instances with the aim of beating out app-bound encryption safeguards. It also plantes data from applications such as VPN clients, Cloud Command Line Interface (CLI) utilities, connected file sharing, and Discord.

“PXA Stealer uses botids (stored as token_bot) to establish a link between the main bot and various Chatids (stored as chat_id),” the researchers said. “Chatids is a Telegram channel with a variety of properties, but it mainly helps host Exftrated data and provide updates and notifications to operators.”

“This threat has matured into a highly evasive multi-stage operation driven by Vietnamese-speaking actors with obvious connections to the organized cybercriminal telegram-based market that sells stolen victim data.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNorth Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says
Next Article Nvidia Triton bug causes unrecognized attackers to run code and hijack AI servers
user
  • Website

Related Posts

Nvidia Triton bug causes unrecognized attackers to run code and hijack AI servers

August 4, 2025

VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More

August 4, 2025

Interim Attack Prevention Guide

August 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Nvidia Triton bug causes unrecognized attackers to run code and hijack AI servers

Vietnamese hackers use PXA steelers to hit 4,000 IPS and steal 200,000 passwords worldwide

North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

OpenMind wants to be the Android operating system for humanoid robots

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.