Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

Posted on May 18, 2025May 18, 2025 By CWS

A brand new information-stealing malware dubbed “PupkinStealer” has been recognized by cybersecurity researchers, focusing on delicate person knowledge by way of a simple but efficient method.

First noticed in April 2025, this .NET-based malware written in C# focuses on stealing browser credentials, messaging app classes, and desktop recordsdata, exfiltrating the information by way of Telegram’s Bot API.

Safety consultants notice that PupkinStealer’s simplicity and use of legit platforms for command-and-control operations make it a noteworthy menace, notably because it lacks refined anti-analysis options that might usually set off safety options.

PupkinStealer operates as a light-weight 32-bit executable with a file dimension of simply 6.21 MB, developed utilizing the .NET framework and C#. Regardless of its comparatively small footprint, the malware demonstrates important knowledge harvesting capabilities.

PupkinStealer Assaults Home windows System

Safety researchers have decided that PupkinStealer targets a selected vary of delicate data, together with saved passwords and cookies from internet browsers, session knowledge from messaging platforms like Telegram and Discord, and choose desktop recordsdata with particular extensions.

Upon execution, the malware creates a compressed ZIP archive containing all stolen knowledge, enriched with sufferer metadata together with username, public IP handle, and Home windows Safety Identifier.

The malware’s design prioritizes compatibility throughout each x86 and x64 environments, utilizing the Costura library to embed compressed DLLs.

In contrast to extra refined malware strains that make use of intensive evasion methods, PupkinStealer depends on simple execution strategies and the absence of persistence mechanisms, suggesting a “hit-and-run” method designed to reduce detection throughout its temporary operational window.

The malware captures a 1920×1080 JPG screenshot of the sufferer’s desktop, offering attackers with extra contextual details about the compromised system.

PupkinStealer’s design signifies it was created for less-sophisticated menace actors, probably distributed by way of malware-as-a-service (MaaS) fashions that allow speedy monetization by way of credential theft and knowledge resale.

PupkinStealer’s use of Telegram’s Bot API for command-and-control and knowledge exfiltration represents a rising pattern amongst cybercriminals who leverage legit platforms to mix malicious site visitors with regular communications.

In response to safety researchers, malware that makes use of Telegram as a C2 channel usually employs the Telegram Bot API for communications, permitting attackers to keep up management whereas hiding their actions inside legit site visitors patterns.

Researchers have recognized a major flaw in Telegram’s Bot API that PupkinStealer exploits: all previous bot messages may be replayed by an adversary able to intercepting and decrypting HTTPS site visitors.

In contrast to common Telegram messages that use the platform’s MTProto encryption, bot API communications are solely protected by the HTTPS layer, making a safety vulnerability.

The malware exfiltrates stolen knowledge by sending the compressed archive to a Telegram bot by way of a crafted API URL, with captions detailing sufferer data and module success flags to reinforce knowledge processing effectivity.

This method permits attackers to evade conventional community monitoring options by hiding inside site visitors to a well-liked messaging platform.

“Ardent” Developer with Doable Russian Connections

Cybersecurity researchers attribute PupkinStealer to a developer often called “Ardent” primarily based on embedded code strings discovered throughout evaluation.

The presence of Russian-language textual content within the Telegram bot’s metadata, together with the time period “kanal” (Russian for “channel”), suggests potential Russian origins, though no definitive geographic focusing on has been confirmed.

This attribution data comes amid rising issues about ransomware and information-stealing campaigns originating from Japanese European cybercriminal teams.

The emergence of PupkinStealer highlights an evolving menace panorama the place malware authors more and more deal with simplicity and legit platform abuse relatively than refined technical options.

Its deal with e-commerce associated knowledge, together with browser credentials and monetary platform classes, poses important dangers to on-line retailers and their clients.

Safety consultants suggest that organizations implement multi-factor authentication, repeatedly audit third-party utility entry to messaging platforms, and keep sturdy endpoint safety to defend towards this rising menace.

As PupkinStealer demonstrates, trendy malware now not requires advanced code to successfully steal delicate data – typically the best approaches show most troublesome to detect.

ItemDetailsMalware SamplePupkinStealerSample Hash9309003c245f94ba4ee52098dadbaa0d0a4d83b423d76c1bfc082a1c29e0b95fSearch Command$ polyswarm hyperlink listing -f PupkinStealer

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Attacks, Credentials, Desktop, Files, Login, PupkinStealer, Steal, System, Windows

Post navigation

Previous Post: How to Recognize a Fake Website
Next Post: How to Recognize a Phishing Email

Related Posts

New Mamona Ransomware Attack Windows Machines by Abusing Ping Commands Cyber Security News
Lampion Banking Malware Employs ClickFix Lures To Steal Banking Information Cyber Security News
How to Stay Ahead of Vulnerabilities Cyber Security News
Chinese Agent Impersonates as Stanford Student For Intelligence Gathering Cyber Security News
Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News
72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Days Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • How to Recover From a Data Breach
  • BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software
  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News