Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Posted on January 20, 2026January 20, 2026 By CWS

SolyxImmortal represents a notable development in information-stealing malware focusing on Home windows methods.

This Python-based menace combines a number of information theft capabilities right into a single, persistent implant designed for long-term surveillance fairly than damaging exercise.

The malware operates silently within the background, accumulating credentials, paperwork, keystrokes, and screenshots whereas sending stolen data on to attackers by Discord webhooks.

Its emergence in January 2026 marks a shift towards stealthier operational fashions that prioritize steady monitoring over speedy exploitation.

The assault vector facilities on distributing the malware, packaged as a legitimate-looking Python script named “Lethalcompany.py,” to focus on methods.

All execution behaviour is hardcoded (Supply – Cyfirma)

As soon as executed, SolyxImmortal instantly establishes persistence by a number of mechanisms and launches background surveillance threads.

The malware doesn’t unfold laterally or propagate itself; as a substitute, it focuses solely on harvesting information from a single compromised gadget.

This targeted method allows attackers to keep up long-term visibility into person exercise with out drawing consideration.

Cyfirma analysts recognized SolyxImmortal as a complicated menace that leverages authentic Home windows APIs and trusted platforms for command-and-control communication.

Persistence Mechanism (Supply – Cyfirma)

The malware’s design displays operational maturity, emphasizing reliability and stealth over complexity.

By using Discord webhooks for information transmission, attackers exploit the platform’s popularity and HTTPS encryption to keep away from network-based detection.

This system demonstrates how menace actors more and more abuse authentic providers to cover malicious exercise.

Persistence Mechanism and Browser Credential Theft

The malware establishes persistence by copying itself to a hidden location inside the AppData listing, renaming it to resemble a authentic Home windows part.

It then registers itself within the Home windows registry Run key, guaranteeing computerized execution upon every person login with out requiring administrative privileges.

Doc and File Harvesting (Supply – Cyfirma)

This method ensures continued operation even after system restarts.

SolyxImmortal targets a number of browsers together with Chrome, Edge, Courageous, and Opera GX by accessing their profile directories.

The malware extracts browser grasp encryption keys utilizing Home windows DPAPI, then decrypts saved credentials by AES-GCM encryption.

Recovered credentials seem in plaintext format earlier than exfiltration, indicating minimal native safety measures.

The malware additionally harvests paperwork by scanning the person’s house listing for recordsdata with particular extensions like .pdf, .docx, and .xlsx, filtering outcomes by file dimension to keep away from community overhead.

Remaining information zip file (Supply – Cyfirma)

All stolen artifacts are compressed right into a ZIP archive and transmitted to attacker-controlled Discord webhooks, finishing the information theft cycle.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Data, Discord, Harvest, Leverages, Malware, PythonBased, Sensitive, Silently, SolyxImmortal

Post navigation

Previous Post: Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
Next Post: Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

Related Posts

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks Cyber Security News
New Text Message Based Phishing Attack from China Targeting Users Around the Globe Cyber Security News
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks Cyber Security News
Tenda N300 Vulnerabilities Let Attacker to Execute Arbitrary Commands as Root User Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • APT-Grade PDFSider Malware Used by Ransomware Groups
  • The Hidden Risk of Orphan Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chainlit Vulnerabilities May Leak Sensitive Information
  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature
  • APT-Grade PDFSider Malware Used by Ransomware Groups
  • The Hidden Risk of Orphan Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark