Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

Posted on October 24, 2025October 24, 2025 By CWS

A classy Python-based distant entry trojan has emerged within the gaming neighborhood, disguising itself as a reliable Minecraft consumer to compromise unsuspecting customers.

The malware, recognized as a multi-function RAT, leverages the Telegram Bot API as its command and management infrastructure, enabling attackers to exfiltrate stolen information and remotely work together with sufferer machines.

By masquerading as “Nursultan Consumer,” a reputation related to a reliable Minecraft modification standard amongst Japanese-European and Russian gaming communities, the menace efficiently deceives customers into executing the malicious payload.

The malware was packaged utilizing PyInstaller, leading to an unusually massive 68.5 MB executable file.

This inflation serves a twin function: accommodating Python dependencies whereas evading safety instruments configured to bypass recordsdata exceeding sure measurement thresholds.

Upon execution, the pattern instantly conceals its presence by hiding the console window on Home windows programs whereas displaying a faux set up progress bar to take care of the phantasm of reliable software program set up.

Pretend set up progress bar (Supply – Netskope)

Netskope researchers recognized the menace throughout routine menace looking actions, discovering the executable with SHA256 hash 847ef096af4226f657cdd5c8b9c9e2c924d0dbab24bb9804d4b3afaf2ddf5a61.

The evaluation revealed that the malware makes an attempt to determine persistence by making a registry key named “NursultanClient” within the Home windows startup path. Nevertheless, this persistence mechanism incorporates important flaws that can doubtless trigger it to fail.

The malware incorrectly constructs the startup command for the compiled executable, because it was designed for a uncooked Python script moderately than a PyInstaller software.

Moreover, the non permanent listing created throughout execution is deleted as soon as the method exits, stopping the malware from operating on subsequent system startups.

Telegram-Primarily based Command and Management Infrastructure

The malware’s core operation facilities on its abuse of Telegram as a covert command and management channel.

The script incorporates a hardcoded Telegram Bot Token (8362039368:AAGj_jyw6oYftV2QQYiYoUslJOmXq6bsAYs) and a restricted checklist of allowed Telegram consumer IDs (6804277757), making certain solely the approved attacker can situation instructions to contaminated machines.

This design suggests a Malware-as-a-Service distribution mannequin, the place the hardcoded consumer ID features as a primary licensing mechanism.

The menace actor can simply modify this single identifier for every purchaser, recompile the executable, and distribute personalised copies that solely particular person purchasers can management.

The malware signature “by fifetka” embedded inside system reconnaissance reviews additional helps this commercialized method, indicating an operation designed to draw low-level menace actors moderately than representing a single attacker’s marketing campaign.

The RAT consists of in depth information-stealing capabilities concentrating on Discord authentication tokens throughout a number of platforms, together with steady, PTB, and Canary builds.

It scans native storage recordsdata and consumer information directories of main net browsers comparable to Chrome, Edge, Firefox, Opera, and Courageous, extracting tokens from each LevelDB and SQLite databases.

Past credential theft, the malware offers complete surveillance options, together with screenshot seize, webcam pictures, and system reconnaissance capabilities that acquire detailed profiles containing laptop names, usernames, working system variations, processor specs, reminiscence utilization, and each native and exterior IP addresses.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:App, Computer, Data, Legitimate, Mimic, Minecraft, Python, RAT, Sensitive, Steals, Users

Post navigation

Previous Post: SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware
Next Post: Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

Related Posts

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor Cyber Security News
15 Best Identity & Access Management Solutions (IAM) in 2025 Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News
New Quishing Attack With Weaponized QR Code Targeting Microsoft Users Cyber Security News
New SmartAttack Steals Sensitive Data From Air-Gapped Systems via Smartwatches Cyber Security News
VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
  • Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
  • Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
  • Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
  • New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News