{"id":2398,"date":"2025-05-13T11:36:10","date_gmt":"2025-05-13T11:36:10","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=2398"},"modified":"2025-05-13T11:36:11","modified_gmt":"2025-05-13T11:36:11","slug":"pupkinstealer-targets-home-windows-customers-to-steal-browser-login-credentials","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=2398","title":{"rendered":"PupkinStealer Targets Home windows Customers to Steal Browser Login Credentials"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A newly recognized information-stealing malware dubbed PupkinStealer has emerged as a big risk to Home windows customers, with its first sightings reported in April 2025. <\/p>\n<p>Written in C# utilizing the .NET framework, this malicious software program is engineered to pilfer delicate knowledge, together with <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/trox-stealer-harvests-sensitive-data-including-stored-credit-cards\/\" target=\"_blank\" rel=\"noreferrer noopener\">browser credentials<\/a>, messaging app classes from platforms like Telegram and Discord, desktop paperwork, and full-screen screenshots. <\/p>\n<p>What units PupkinStealer aside is its crafty use of Telegram\u2019s Bot API for knowledge exfiltration, a way that leverages encrypted, trusted infrastructure to bypass conventional community filtering instruments. <\/p>\n<div class=\"td-a-ad id_inline_ad0 id_ad_content-horiz-center\"><span class=\"td-adspot-title\">&#8211; Commercial &#8211;<\/span><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgtF4v5Ejzb9hD6O8UG7KJJziqO1ZP5zcUuKXNsyjb4g3FugqSKlBjBKmUNqGCjtqOq8kEb1lM6uZOBXm0lUCSTqXKyP4hz81q77L_k5I4RBy3afKYWuunQXOVo9zA4MFlD75XmYOjxT0sNIO9RR8UZPin1ZBVShx5Xj-5D9SyEp0QgEPoA6vxXp3Q4DInb\/s16000\/Don%E2%80%99t%20miss%20our%20latest%20stories%20on%20Google%20News%20(1).png&#10;\" alt=\"Google News\"\/><\/a><\/div>\n<p>This strategy makes it significantly difficult for safety techniques to detect and block the malware\u2019s outbound communications.<\/p>\n<h2 class=\"wp-block-heading\"><strong><strong>New C# Malware Exploits Telegram<\/strong><\/strong><\/h2>\n<p>Distributed as an unsigned .NET executable, PupkinStealer depends on social engineering ways resembling phishing emails, pretend downloads, or immediate messaging lures to trick victims into manually executing the malicious file. <\/p>\n<p>As soon as launched, it asynchronously executes a collection of focused features: decrypting and extracting login credentials from Chromium-based browsers like Chrome, Edge, Opera, and Vivaldi utilizing the Native State encryption key and Home windows DPAPI. <\/p>\n<p>Amassing desktop information with extensions resembling .pdf, .txt, .sql, .jpg, and .png; hijacking Telegram classes by stealing the tdata folder for potential account takeover; extracting authentication tokens from Discord purchasers (normal, PTB, and Canary) through LevelDB; and capturing a 1920\u00d71080 JPEG screenshot of the sufferer\u2019s desktop. <\/p>\n<p>The stolen knowledge is meticulously organized into distinct directories below %APPDATApercentTemp$$Username], compressed right into a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/malicious-chrome-extension-zip\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZIP archive<\/a> named [Username]@ardent.zip, and uploaded to an attacker-controlled Telegram bot through HTTPS POST requests. <\/p>\n<p>Metadata such because the sufferer\u2019s IP handle, username, and SID are included within the transmission, offering attackers with further context for exploitation. <\/p>\n<p>Notably, the malware employs the Costura.Fody library to embed dependencies and improve entropy within the executable\u2019s .textual content part, a rudimentary obfuscation tactic to evade some detection heuristics. <\/p>\n<p>In response to Cybersec Sentinel <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cybersecsentinel.com\/pupkinstealer-emerges-as-new-net-malware-threat-targeting-browser-and-messaging-data\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Report<\/a>, tentative attribution factors to a developer alias \u201cArdent,\u201d inferred from embedded code strings and file naming conventions.<\/p>\n<h2 class=\"wp-block-heading\"><strong><strong>A Risk to Enterprise and Particular person Customers<\/strong><\/strong><\/h2>\n<p>Regardless of its lack of persistence mechanisms or superior anti-analysis strategies, PupkinStealer\u2019s centered performance and stealthy exfiltration methodology render it a potent risk, scoring an elevated danger score of 6.5\/10. <\/p>\n<p>Its capability to steal credentials, session knowledge, and private information poses dangers of account takeover, social engineering, and reputational or monetary harm. <\/p>\n<p>Mitigation requires a multi-layered strategy: person training to keep away from executing suspicious information, electronic mail filtering to dam executable attachments, up to date antivirus and EDR instruments with behavioral evaluation, customized YARA guidelines for detection, 2FA enforcement on important accounts, and log monitoring for uncommon ZIP file creation or connections to api.telegram.org. <\/p>\n<p>PupkinStealer exemplifies a rising development of malware abusing trusted cloud companies for command-and-control and knowledge theft, underscoring the necessity for strong endpoint safety and validated risk intelligence-evident within the correction of a previous misattribution of the area instance-i4zsy0relay[.]screenconnect.com, which is unrelated to this marketing campaign.<\/p>\n<h2 class=\"wp-block-heading\"><strong><strong>Indicators of Compromise (IoCs)<\/strong><\/strong><\/h2>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th><strong>Sort<\/strong><\/th>\n<th><strong>Worth<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>MD5<\/td>\n<td>fc99a7ef8d7a2028ce73bf42d3a95bce<\/td>\n<\/tr>\n<tr>\n<td>SHA-256<\/td>\n<td>9309003c245f94ba4ee52098dadbaa0d0a4d83b423d76c1bfc082a1c29e0b95f<\/td>\n<\/tr>\n<tr>\n<td>URL<\/td>\n<td>https[:]\/\/api[.]telegram[.]org\/bot[BotToken]\/sendDocument?chat_id=7613862165&amp;caption<\/td>\n<\/tr>\n<tr>\n<td>Telegram Bot Token<\/td>\n<td>8013735771:AAE_UrTgQsAmiAsXeDN6mehD_fo3vEg-kCM<\/td>\n<\/tr>\n<tr>\n<td>File Paths<\/td>\n<td>%APPDATApercentTemp$$Username]GrabbersBrowserpasswords.txt, and so on.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong><strong>Discover this Information Attention-grabbing! Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, &amp;\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates!<\/strong><\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A newly recognized information-stealing malware dubbed PupkinStealer has emerged as a big risk to Home windows customers, with its first sightings reported in April 2025. Written in C# utilizing the .NET framework, this malicious software program is engineered to pilfer delicate knowledge, together with browser credentials, messaging app classes from platforms like Telegram and Discord, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2400,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[214,483,2268,2355,1443,303,342,1059],"class_list":["post-2398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-browser","tag-credentials","tag-login","tag-pupkinstealer","tag-steal","tag-targets","tag-users","tag-windows"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2398"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2398\/revisions"}],"predecessor-version":[{"id":2399,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/2398\/revisions\/2399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/2400"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-14 23:24:08 UTC -->