Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BoryptGrab Malware Exploits Over 100 GitHub Repositories

BoryptGrab Malware Exploits Over 100 GitHub Repositories

Posted on March 7, 2026 By CWS

A new cyber threat identified as BoryptGrab is leveraging a network of over 100 GitHub repositories to spread its malicious software, according to cybersecurity firm Trend Micro. This malware poses a significant risk by targeting sensitive data from various sources including web browsers and cryptocurrency wallets.

Characteristics of the BoryptGrab Stealer

BoryptGrab is designed to extract a wide range of information from infected systems. It can gather data from numerous web browsers and cryptocurrency wallet applications, while also collecting system details and user files. Furthermore, some versions of BoryptGrab are capable of deploying a backdoor called TunnesshClient, which facilitates command-and-control communication through an SSH tunnel.

Trend Micro’s research uncovered that BoryptGrab disguises itself as free software tools within ZIP archives on GitHub, a tactic it has used since late 2025. These archives share common characteristics, such as Russian-language comments and URL-fetching logic, although the methods of execution vary across different instances.

Technical Details and Execution Methods

The BoryptGrab malware utilizes multiple strategies for execution, including DLL sideloading and VBS scripts to launch its executables. Observations also included the use of a .NET executable and a Golang downloader known as HeaconLoad. This variety in execution methods reflects the malware’s adaptability and sophistication.

Additionally, BoryptGrab incorporates advanced checks to evade detection, such as VM and anti-analysis tests, and attempts to run with elevated privileges. It employs Chrome App Bound Encryption techniques and downloads a Chromium helper to gather data from targeted browsers. The malware also harvests files from desktop cryptocurrency wallets and browser extensions.

Impact and Security Implications

The BoryptGrab campaign highlights a growing threat to users who unknowingly download deceptive software from seemingly legitimate GitHub repositories. This operation is part of a broader trend towards more sophisticated and engineered cyber threats. Trend Micro notes that the evolving nature of BoryptGrab, including its ability to obtain Telegram files, browser passwords, and Discord tokens, indicates a significant advancement in malware capabilities.

In conclusion, the BoryptGrab malware campaign underscores the importance of maintaining robust cybersecurity measures and vigilance against deceptive software downloads. Users are encouraged to exercise caution when accessing software repositories and to implement comprehensive security solutions to protect against such threats.

Security Week News Tags:BoryptGrab, crypto wallets, cyber threat, Cybersecurity, GitHub, information stealer, Malware, SSH tunnel, Trend Micro, TunnesshClient

Post navigation

Previous Post: Malicious Chrome Extension Targets Crypto Wallets
Next Post: Anthropic AI Unearths Firefox Security Flaws

Related Posts

Critical Fixes Released for VMware Aria Operations Flaws Critical Fixes Released for VMware Aria Operations Flaws Security Week News
Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid Russian Sandworm Hackers Blamed for Cyberattack on Polish Power Grid Security Week News
WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation WormGPT 4 and KawaiiGPT: New Dark LLMs Boost Cybercrime Automation Security Week News
Massive China-Linked Smishing Campaign Leveraged 194,000 Domains Massive China-Linked Smishing Campaign Leveraged 194,000 Domains Security Week News
Claude Mythos: A Revolutionary AI Model with Cybersecurity Implications Claude Mythos: A Revolutionary AI Model with Cybersecurity Implications Security Week News
Traveler Information Stolen in Eurail Data Breach Traveler Information Stolen in Eurail Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Identity Visibility Lacking in Enterprises, Study Finds
  • BreachLock Recognized in 2026 Gartner AEV Guide
  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark