Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Posted on January 30, 2026January 30, 2026 By CWS

A classy PowerShell-based malware named TAMECAT has emerged as a important menace to enterprise safety, focusing on login credentials saved in Microsoft Edge and Chrome browsers.

This malware operates as a part of espionage campaigns carried out by APT42, an Iranian state-sponsored cyber-espionage group that has been actively focusing on high-value senior protection and authorities officers worldwide.

The menace demonstrates superior capabilities in credential theft, information exfiltration, and chronic entry to compromised techniques.

TAMECAT employs a multi-stage an infection course of that begins with social engineering ways.

The attackers impersonate trusted WhatsApp contacts and ship victims malicious hyperlinks that abuse the search-ms URI protocol handler.

As soon as activated, the malware downloads a VBScript that performs antivirus detection on the goal system to find out the suitable execution path.

Particulars Of TAMECAT’s capabilities (Supply – Pulsedive)

This preliminary reconnaissance permits the malware to adapt its deployment technique based mostly on the safety setting it encounters.

Pulsedive Menace Analysis analysts recognized TAMECAT as leveraging a number of command-and-control channels, together with Telegram bots, Discord, Firebase, and Cloudflare Staff infrastructure.

The malware’s modular structure allows it to obtain extra PowerShell scripts and execute varied instructions remotely.

Every module serves a particular goal, starting from browser credential extraction to display seize and file system crawling, making it a complete surveillance device.

The menace actors behind TAMECAT make the most of WebDAV servers to ship malicious LNK recordsdata disguised as PDF paperwork.

VBScript used to obtain TAMECAT (Supply – Pulsedive)

When executed, these recordsdata set off a series of occasions that set up persistence by logon scripts and registry run keys.

The malware communicates with its command-and-control infrastructure utilizing encrypted channels, using AES encryption with predefined keys to guard stolen information throughout transit.

This layered method to obfuscation makes detection considerably tougher for conventional safety instruments.

TAMECAT implements subtle strategies to extract login credentials from each Microsoft Edge and Chrome browsers.

The malware makes use of Microsoft Edge’s distant debugging characteristic to entry browser information whereas the applying is working.

For Chrome, TAMECAT suspends the browser course of briefly to achieve unrestricted entry to saved credential databases.

The decoded Borjol operate (Supply – Pulsedive)

This dual-capability method ensures the malware can harvest delicate authentication data no matter which browser the sufferer prefers.

The credential extraction module operates fully in reminiscence, leaving minimal forensic traces on the contaminated system.

Code that’s run based mostly on the response from the C2 server (Supply – Pulsedive)

As soon as credentials are collected, TAMECAT employs its Obtain Module and a specialised DLL element known as Runs.dll to chunk the stolen information into smaller segments earlier than exfiltration.

This segmentation technique helps the malware evade community monitoring instruments that may flag giant information transfers.

The exfiltration course of makes use of a number of channels concurrently, together with FTP and HTTPS protocols, offering redundancy in case one communication path turns into blocked or monitored.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Backdoor, Chrome, Credentials, Edge, Exfiltrates, Login, Microsoft, PowerShellBased, TAMECAT

Post navigation

Previous Post: Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
Next Post: 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Related Posts

Microsoft Azure Cloud Disrupted by Undersea Cable Cuts in Red Sea Cyber Security News
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Cyber Security News
2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers Cyber Security News
Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms Cyber Security News
Why Your Business Needs Live Threat Intel from 15K SOCs Cyber Security News
81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark