Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Posted on January 20, 2026January 20, 2026 By CWS

SolyxImmortal represents a notable development in information-stealing malware focusing on Home windows methods.

This Python-based menace combines a number of information theft capabilities right into a single, persistent implant designed for long-term surveillance fairly than damaging exercise.

The malware operates silently within the background, accumulating credentials, paperwork, keystrokes, and screenshots whereas sending stolen data on to attackers by Discord webhooks.

Its emergence in January 2026 marks a shift towards stealthier operational fashions that prioritize steady monitoring over speedy exploitation.

The assault vector facilities on distributing the malware, packaged as a legitimate-looking Python script named “Lethalcompany.py,” to focus on methods.

All execution behaviour is hardcoded (Supply – Cyfirma)

As soon as executed, SolyxImmortal instantly establishes persistence by a number of mechanisms and launches background surveillance threads.

The malware doesn’t unfold laterally or propagate itself; as a substitute, it focuses solely on harvesting information from a single compromised gadget.

This targeted method allows attackers to keep up long-term visibility into person exercise with out drawing consideration.

Cyfirma analysts recognized SolyxImmortal as a complicated menace that leverages authentic Home windows APIs and trusted platforms for command-and-control communication.

Persistence Mechanism (Supply – Cyfirma)

The malware’s design displays operational maturity, emphasizing reliability and stealth over complexity.

By using Discord webhooks for information transmission, attackers exploit the platform’s popularity and HTTPS encryption to keep away from network-based detection.

This system demonstrates how menace actors more and more abuse authentic providers to cover malicious exercise.

Persistence Mechanism and Browser Credential Theft

The malware establishes persistence by copying itself to a hidden location inside the AppData listing, renaming it to resemble a authentic Home windows part.

It then registers itself within the Home windows registry Run key, guaranteeing computerized execution upon every person login with out requiring administrative privileges.

Doc and File Harvesting (Supply – Cyfirma)

This method ensures continued operation even after system restarts.

SolyxImmortal targets a number of browsers together with Chrome, Edge, Courageous, and Opera GX by accessing their profile directories.

The malware extracts browser grasp encryption keys utilizing Home windows DPAPI, then decrypts saved credentials by AES-GCM encryption.

Recovered credentials seem in plaintext format earlier than exfiltration, indicating minimal native safety measures.

The malware additionally harvests paperwork by scanning the person’s house listing for recordsdata with particular extensions like .pdf, .docx, and .xlsx, filtering outcomes by file dimension to keep away from community overhead.

Remaining information zip file (Supply – Cyfirma)

All stolen artifacts are compressed right into a ZIP archive and transmitted to attacker-controlled Discord webhooks, finishing the information theft cycle.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Data, Discord, Harvest, Leverages, Malware, PythonBased, Sensitive, Silently, SolyxImmortal

Post navigation

Previous Post: Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
Next Post: Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

Related Posts

SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups Cyber Security News
Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Iranian Cyber Attacks Target US Networks, Cameras for Surveillance Cyber Security News
Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Cyber Security News
Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Salesloft Drift Cyberattack Linked to GitHub Compromise and OAuth Token Theft Cyber Security News
Cisco Acquires Astrix to Bolster AI Identity Security Cisco Acquires Astrix to Bolster AI Identity Security Cyber Security News
China-Linked Cyberattack Targets Southeast Asian Military China-Linked Cyberattack Targets Southeast Asian Military Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark