Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SnappyClient Malware Threatens Windows with Stealthy Data Breaches

SnappyClient Malware Threatens Windows with Stealthy Data Breaches

Posted on March 19, 2026 By CWS

A newly identified malware known as SnappyClient has emerged as a significant threat to Windows users, combining remote access, data theft capabilities, and advanced evasion techniques in one compact C++ framework. Discovered in December 2025, this malware can execute keystroke logging, capture screenshots, initiate remote terminals, and extract sensitive information from browsers and applications—all while bypassing detection by security tools.

Initial Detection and Delivery Methods

Initially detected by researchers at Zscaler ThreatLabz, SnappyClient was found to use a fake website impersonating the telecommunications company Telefónica to deploy its attack. German-speaking visitors to the site were automatically served a HijackLoader download. Once executed, HijackLoader decrypts and loads SnappyClient directly into the system’s memory. In early February 2026, a secondary delivery method involving a ClickFix trick was observed, further spreading SnappyClient via GhostPulse and HijackLoader.

SnappyClient communicates with its command-and-control server over TCP using a fully custom protocol. Its network traffic is made difficult to inspect due to compression with the Snappy algorithm and encryption with ChaCha20-Poly1305.

Data Theft and Cryptocurrency Targeting

Targeting a wide range of applications, SnappyClient focuses on stealing data from ten browsers, including Chrome, Firefox, Edge, Opera, and Brave. It extracts saved passwords, session cookies, and full browser profiles. The malware also targets cryptocurrency-related extensions such as MetaMask, Phantom, and Coinbase Wallet, as well as standalone applications like Exodus and Ledger Live. Cryptocurrency theft appears to be the primary financial goal behind these attacks.

Beyond data theft, SnappyClient offers reverse proxy capabilities for FTP, VNC, SOCKS5, and RLOGIN, providing attackers with multiple entry points into a victim’s network. It can manipulate clipboard data in real time, redirecting cryptocurrency transactions by swapping out wallet addresses.

Evasion Techniques and Persistence

SnappyClient is designed to circumvent security measures effectively. It hooks Windows’ LoadLibraryExW function and neutralizes attempts to load amsi.dll by patching AmsiScanBuffer and AmsiScanString, effectively disabling the Windows Antimalware Scan Interface without detection. It also employs Heaven’s Gate to switch between 32-bit and 64-bit execution modes, bypassing user-mode API hooks.

For persistence, SnappyClient registers a scheduled task triggered at user logon and, if unsuccessful, creates an autorun entry in the registry. It copies itself to a specified path and launches from there, making forensic recovery challenging by encrypting its sensitive files with ChaCha20.

To mitigate the risks posed by SnappyClient, users and organizations should avoid downloading executables from unverified sources. Security teams should monitor for unusual task creation and registry changes as indicators of SnappyClient’s presence. Implementing endpoint detection rules for Heaven’s Gate patterns and maintaining updated browsers can reduce vulnerability to App-Bound Encryption bypass attempts.

Stay informed about cybersecurity developments by following us on Google News, LinkedIn, and X for more updates.

Cyber Security News Tags:cryptocurrency theft, Cybersecurity, data breach, evasion techniques, HijackLoader, Malware, remote access, SnappyClient, Windows security, Zscaler

Post navigation

Previous Post: LeakNet Ramps Up Ransomware Attacks with New Techniques
Next Post: CISA Alerts on Zimbra, SharePoint Vulnerabilities

Related Posts

Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack Cyber Security News
Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News
GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise Cyber Security News
Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Critical WatchGuard Firebox Vulnerabilities Let Attackers Bypass Integrity Checks and Inject Malicious Codes Cyber Security News
Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Ivanti Endpoint Manager Mobile Vulnerabilities Allow Attackers to Decrypt Other Users’ Passwords Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Raven Secures $20M to Enhance Cloud Security Solutions
  • Enhancing Security with Ceros for Claude Code
  • Iran-Linked Botnet Unveiled Through Open Directory Leak
  • CISA Highlights SharePoint Security Vulnerability Exploitation
  • DarkSword iOS Kit Exploits Multiple Flaws for Device Control

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark