Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek

Posted on January 19, 2026January 19, 2026 By CWS

A newly recognized info stealer depends on authentic APIs and third-party libraries for evasive, persistent information harvesting and exfiltration, cybersecurity firm Cyfirma studies.

Dubbed SolyxImmortal, the malware is written in Python and consists of broad information theft and person surveillance capabilities, corresponding to credential and doc harvesting, a keylogger, and display monitoring.

Based on Cyfirma, SolyxImmortal is a monolithic Python utility concentrating on Home windows methods that may launch concurrent surveillance and information assortment threads.

The malware runs silently within the background, doesn’t have self-propagation capabilities, and focuses on steady monitoring and alerting for authentication and different high-value person actions.

SolyxImmortal contains a central controller that establishes persistence, assortment, and surveillance, with all of the malicious habits hardcoded.

Command-and-control (C&C) parameters are additionally hardcoded. The infostealer makes use of two Discord webhooks, one for structured information exfiltration and one other for sending screenshots, and depends on the service’s HTTPS safety and repute to evade network-based detection.Commercial. Scroll to proceed studying.

“The inclusion of a hardcoded Discord person ID allows direct operator mentions, guaranteeing that high-value occasions generate speedy notifications,” Cyfirma notes.

The malware copies itself right into a listing inside the person’s AppData path and renames the executable, marking it as hidden and system-protected. It additionally registers beneath the person’s Run key, so it’s executed at person logon.

Information theft, surveillance capabilities

SolyxImmortal can steal credentials from Chrome and different Chromium-based browsers, concentrating on the Native State file to extract the browser grasp encryption key and decrypt the login entries.

“Recovered credentials are aggregated in plaintext format previous to exfiltration, indicating no native encryption or obfuscation of stolen information,” Cyfirma notes.

The risk additionally enumerates the person’s residence listing to determine paperwork of curiosity and filters them primarily based on extension and measurement. All collected information is staged in a short lived listing, compressed, and exfiltrated.

Moreover, the knowledge stealer shops captured keystrokes in an in-memory buffer and exfiltrates them periodically utilizing a devoted background thread.

It additionally displays the energetic home windows, checks their titles towards a predefined listing (concentrating on authentication and monetary operations), and takes a screenshot when figuring out a match. Every screenshot is straight away despatched to the devoted Discord webhook.

“Along with event-driven seize, routine screenshots are taken at mounted intervals, enabling steady visible surveillance even within the absence of set off key phrases,” Cyfirma explains.

After efficiently exfiltrating the staged information by way of HTTPS POST requests, the malware erases all momentary information and directories.

Designed for opportunistic assaults

Possible meant for low-to-medium sophistication risk actors, SolyxImmortal has been provided on an underground Telegram channel for sharing commodity malware and seems to have been developed by a Turkish-speaking risk actor.

Based mostly on the supposed developer’s underground exercise, Cyfirma believes the malware was designed for opportunistic information theft and surveillance. Nonetheless, it may be simply repurposed and redistributed by different risk actors.

“From a risk panorama perspective, this pattern displays a broader development of mid-tier risk actors leveraging available platforms and scripting languages to deploy efficient surveillance tooling with out sustaining devoted infrastructure,” Cyfirma notes.

Associated: VoidLink Linux Malware Framework Targets Cloud Environments

Associated: Infostealer Malware Delivered in EmEditor Provide Chain Assault

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Instances

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Emerges, Information, SecurityWeek, SolyxImmortal, Stealer

Post navigation

Previous Post: Cyber Insights 2026: Information Sharing
Next Post: Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Related Posts

PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins Security Week News
Verisoul Raises $8.8 Million for Fraud Prevention Security Week News
F5 to Acquire CalypsoAI for $180 Million Security Week News
US and Allies Sanction Russian Bulletproof Hosting Service Providers Security Week News
Russian APT Hits Ukrainian Government With New Malware via Signal Security Week News
Sean Cairncross Confirmed by Senate as National Cyber Director Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Redirected Employee Paychecks Without Breaching a Single System
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • New Spear-Phishing Attack Abusing Google Ads to Deliver EndRAT Malware
  • TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking
  • Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark