Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Posted on January 30, 2026January 30, 2026 By CWS

A classy PowerShell-based malware named TAMECAT has emerged as a important menace to enterprise safety, focusing on login credentials saved in Microsoft Edge and Chrome browsers.

This malware operates as a part of espionage campaigns carried out by APT42, an Iranian state-sponsored cyber-espionage group that has been actively focusing on high-value senior protection and authorities officers worldwide.

The menace demonstrates superior capabilities in credential theft, information exfiltration, and chronic entry to compromised techniques.

TAMECAT employs a multi-stage an infection course of that begins with social engineering ways.

The attackers impersonate trusted WhatsApp contacts and ship victims malicious hyperlinks that abuse the search-ms URI protocol handler.

As soon as activated, the malware downloads a VBScript that performs antivirus detection on the goal system to find out the suitable execution path.

Particulars Of TAMECAT’s capabilities (Supply – Pulsedive)

This preliminary reconnaissance permits the malware to adapt its deployment technique based mostly on the safety setting it encounters.

Pulsedive Menace Analysis analysts recognized TAMECAT as leveraging a number of command-and-control channels, together with Telegram bots, Discord, Firebase, and Cloudflare Staff infrastructure.

The malware’s modular structure allows it to obtain extra PowerShell scripts and execute varied instructions remotely.

Every module serves a particular goal, starting from browser credential extraction to display seize and file system crawling, making it a complete surveillance device.

The menace actors behind TAMECAT make the most of WebDAV servers to ship malicious LNK recordsdata disguised as PDF paperwork.

VBScript used to obtain TAMECAT (Supply – Pulsedive)

When executed, these recordsdata set off a series of occasions that set up persistence by logon scripts and registry run keys.

The malware communicates with its command-and-control infrastructure utilizing encrypted channels, using AES encryption with predefined keys to guard stolen information throughout transit.

This layered method to obfuscation makes detection considerably tougher for conventional safety instruments.

TAMECAT implements subtle strategies to extract login credentials from each Microsoft Edge and Chrome browsers.

The malware makes use of Microsoft Edge’s distant debugging characteristic to entry browser information whereas the applying is working.

For Chrome, TAMECAT suspends the browser course of briefly to achieve unrestricted entry to saved credential databases.

The decoded Borjol operate (Supply – Pulsedive)

This dual-capability method ensures the malware can harvest delicate authentication data no matter which browser the sufferer prefers.

The credential extraction module operates fully in reminiscence, leaving minimal forensic traces on the contaminated system.

Code that’s run based mostly on the response from the C2 server (Supply – Pulsedive)

As soon as credentials are collected, TAMECAT employs its Obtain Module and a specialised DLL element known as Runs.dll to chunk the stolen information into smaller segments earlier than exfiltration.

This segmentation technique helps the malware evade community monitoring instruments that may flag giant information transfers.

The exfiltration course of makes use of a number of channels concurrently, together with FTP and HTTPS protocols, offering redundancy in case one communication path turns into blocked or monitored.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Backdoor, Chrome, Credentials, Edge, Exfiltrates, Login, Microsoft, PowerShellBased, TAMECAT

Post navigation

Previous Post: Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
Next Post: 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Related Posts

Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets Cyber Security News
Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network Cyber Security News
CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access Cyber Security News
ChatGPT Down – Users Report Outage Worldwide, Conversations Disappeared for Users Cyber Security News
25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks Cyber Security News
Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark