Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
Aug. 4, 2025, 9 p.m.
Description
SentinelLABS and Beazley Security uncovered a series of infostealer campaigns delivering the Python-based PXA Stealer. The malware, which first appeared in late 2024, has evolved to incorporate sophisticated anti-analysis techniques and a hardened command-and-control infrastructure. Over 4,000 unique victim IP addresses from 62 countries were identified, with South Korea, the United States, and the Netherlands being the most targeted. The stolen data includes passwords, credit card records, and browser cookies. The threat actors, linked to Vietnamese-speaking cybercriminal circles, monetize the stolen data through a subscription-based underground ecosystem that automates resale via Telegram's API. The campaign showcases the growing trend of weaponizing legitimate infrastructure for large-scale information theft and monetization.
Tags
Date
- Created: Aug. 4, 2025, 4:13 p.m.
- Published: Aug. 4, 2025, 4:13 p.m.
- Modified: Aug. 4, 2025, 9 p.m.
Indicators
- 7775d00a82ec44a718d7ee5417d6097bc4315d3513303bcb9340266cc0c87f73
- a5d0c0dfc4e3e1c157c50d1dfb7b0d376aa35fe5fcac11ce524a8ea7c9cfa54b
- 3e8b370b8f499f5de89bf20bce2f0890c4731b4972943cfb82691ed370d9f62a
- 0cd9f10a8e644754d1c3ed624e7a3d79c738d446e3b5d1f645c4ee2d855ee4ca
- 04d7cbb4a6f4152a59fba1c83b53815716f7008db0b2a4514166bfa9c4413895
Additional Informations
- Cryptocurrency
- Technology
- Finance
- Hungary
- Austria
- Netherlands
- United States of America