Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem

Aug. 4, 2025, 9 p.m.

Description

SentinelLABS and Beazley Security uncovered a series of infostealer campaigns delivering the Python-based PXA Stealer. The malware, which first appeared in late 2024, has evolved to incorporate sophisticated anti-analysis techniques and a hardened command-and-control infrastructure. Over 4,000 unique victim IP addresses from 62 countries were identified, with South Korea, the United States, and the Netherlands being the most targeted. The stolen data includes passwords, credit card records, and browser cookies. The threat actors, linked to Vietnamese-speaking cybercriminal circles, monetize the stolen data through a subscription-based underground ecosystem that automates resale via Telegram's API. The campaign showcases the growing trend of weaponizing legitimate infrastructure for large-scale information theft and monetization.

Date

  • Created: Aug. 4, 2025, 4:13 p.m.
  • Published: Aug. 4, 2025, 4:13 p.m.
  • Modified: Aug. 4, 2025, 9 p.m.

Indicators

  • 7775d00a82ec44a718d7ee5417d6097bc4315d3513303bcb9340266cc0c87f73
  • a5d0c0dfc4e3e1c157c50d1dfb7b0d376aa35fe5fcac11ce524a8ea7c9cfa54b
  • 3e8b370b8f499f5de89bf20bce2f0890c4731b4972943cfb82691ed370d9f62a
  • 0cd9f10a8e644754d1c3ed624e7a3d79c738d446e3b5d1f645c4ee2d855ee4ca
  • 04d7cbb4a6f4152a59fba1c83b53815716f7008db0b2a4514166bfa9c4413895

Additional Informations

  • Cryptocurrency
  • Technology
  • Finance
  • Hungary
  • Austria
  • Netherlands
  • United States of America