Global Infostealer Campaign Hits 4,000 Victims in 62 Countries, Fuels Cybercrime Economy.

A sophisticated cybercrime operation has compromised more than 4,000 victims across 62 countries, exploiting stealthy infostealer malware to harvest sensitive personal information. The attack highlights the growing threat posed by credential-stealing software and the increasing role of encrypted messaging platforms in facilitating the trade of stolen data.

Scope of the Attack

The campaign centers around the Python-based PXA Stealer, a malware family engineered to surreptitiously pilfer victims’ passwords, credit card numbers, and browser cookies. Analysis reveals the malware has operated on a global scale, impacting users in countries including South Korea, the United States, the Netherlands, Hungary, and Austria. More than 200,000 unique passwords, hundreds of credit card records, and upwards of 4 million browser cookies have been siphoned through the attack. This cache of credentials enables further malicious activity, such as unauthorized financial transactions, identity theft, and enterprise intrusions.

Methods and Mechanics

The infection process typically begins with classic cybercrime vectors—phishing emails, malicious websites, or trojanized software downloads. PXA Stealer is adept at evading traditional antivirus solutions by using sideloading techniques, embedding itself within legitimate, digitally signed software like office applications or document readers. Once executed, the malware quietly extracts a wide array of credentials and session tokens from the victim’s system.

Uniquely, this operation leverages Telegram both for remote malware control and as a marketplace for trading stolen data. Attackers use Telegram’s API and bots to automate the exfiltration and dissemination of “stealer logs”—packages containing the collected credentials and sensitive information. Dedicated Telegram channels, such as Moon Cloud and Daisy Cloud, have emerged to aggregate and distribute these logs, some offering samples to attract buyers or providing exclusive paid access to larger dumps.

Telegram: The New Cybercrime Hub

The choice of Telegram as a logistical base for these operations is instrumental in the campaign’s success. The messaging platform’s automation features, broad user base, and relative anonymity allow cybercriminals to efficiently trade in digital contraband. Telegram’s bots and channels streamline the sale and distribution process, enabling criminal operations to scale far beyond traditional one-on-one underground forums.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply