A brand new information-stealing malware dubbed “PupkinStealer” has been recognized by cybersecurity researchers, focusing on delicate person knowledge by way of a simple but efficient method.
First noticed in April 2025, this .NET-based malware written in C# focuses on stealing browser credentials, messaging app classes, and desktop recordsdata, exfiltrating the information by way of Telegram’s Bot API.
Safety consultants notice that PupkinStealer’s simplicity and use of legit platforms for command-and-control operations make it a noteworthy menace, notably because it lacks refined anti-analysis options that might usually set off safety options.
PupkinStealer operates as a light-weight 32-bit executable with a file dimension of simply 6.21 MB, developed utilizing the .NET framework and C#. Regardless of its comparatively small footprint, the malware demonstrates important knowledge harvesting capabilities.
PupkinStealer Assaults Home windows System
Safety researchers have decided that PupkinStealer targets a selected vary of delicate data, together with saved passwords and cookies from internet browsers, session knowledge from messaging platforms like Telegram and Discord, and choose desktop recordsdata with particular extensions.
Upon execution, the malware creates a compressed ZIP archive containing all stolen knowledge, enriched with sufferer metadata together with username, public IP handle, and Home windows Safety Identifier.
The malware’s design prioritizes compatibility throughout each x86 and x64 environments, utilizing the Costura library to embed compressed DLLs.
In contrast to extra refined malware strains that make use of intensive evasion methods, PupkinStealer depends on simple execution strategies and the absence of persistence mechanisms, suggesting a “hit-and-run” method designed to reduce detection throughout its temporary operational window.
The malware captures a 1920×1080 JPG screenshot of the sufferer’s desktop, offering attackers with extra contextual details about the compromised system.
PupkinStealer’s design signifies it was created for less-sophisticated menace actors, probably distributed by way of malware-as-a-service (MaaS) fashions that allow speedy monetization by way of credential theft and knowledge resale.
PupkinStealer’s use of Telegram’s Bot API for command-and-control and knowledge exfiltration represents a rising pattern amongst cybercriminals who leverage legit platforms to mix malicious site visitors with regular communications.
In response to safety researchers, malware that makes use of Telegram as a C2 channel usually employs the Telegram Bot API for communications, permitting attackers to keep up management whereas hiding their actions inside legit site visitors patterns.
Researchers have recognized a major flaw in Telegram’s Bot API that PupkinStealer exploits: all previous bot messages may be replayed by an adversary able to intercepting and decrypting HTTPS site visitors.
In contrast to common Telegram messages that use the platform’s MTProto encryption, bot API communications are solely protected by the HTTPS layer, making a safety vulnerability.
The malware exfiltrates stolen knowledge by sending the compressed archive to a Telegram bot by way of a crafted API URL, with captions detailing sufferer data and module success flags to reinforce knowledge processing effectivity.
This method permits attackers to evade conventional community monitoring options by hiding inside site visitors to a well-liked messaging platform.
“Ardent” Developer with Doable Russian Connections
Cybersecurity researchers attribute PupkinStealer to a developer often called “Ardent” primarily based on embedded code strings discovered throughout evaluation.
The presence of Russian-language textual content within the Telegram bot’s metadata, together with the time period “kanal” (Russian for “channel”), suggests potential Russian origins, though no definitive geographic focusing on has been confirmed.
This attribution data comes amid rising issues about ransomware and information-stealing campaigns originating from Japanese European cybercriminal teams.
The emergence of PupkinStealer highlights an evolving menace panorama the place malware authors more and more deal with simplicity and legit platform abuse relatively than refined technical options.
Its deal with e-commerce associated knowledge, together with browser credentials and monetary platform classes, poses important dangers to on-line retailers and their clients.
Safety consultants suggest that organizations implement multi-factor authentication, repeatedly audit third-party utility entry to messaging platforms, and keep sturdy endpoint safety to defend towards this rising menace.
As PupkinStealer demonstrates, trendy malware now not requires advanced code to successfully steal delicate data – typically the best approaches show most troublesome to detect.
ItemDetailsMalware SamplePupkinStealerSample Hash9309003c245f94ba4ee52098dadbaa0d0a4d83b423d76c1bfc082a1c29e0b95fSearch Command$ polyswarm hyperlink listing -f PupkinStealer
Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar