Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Python-based Malware SolyxImmortal Leverages Discord to Silently Harvest Sensitive Data

Posted on January 20, 2026January 20, 2026 By CWS

SolyxImmortal represents a notable development in information-stealing malware focusing on Home windows methods.

This Python-based menace combines a number of information theft capabilities right into a single, persistent implant designed for long-term surveillance fairly than damaging exercise.

The malware operates silently within the background, accumulating credentials, paperwork, keystrokes, and screenshots whereas sending stolen data on to attackers by Discord webhooks.

Its emergence in January 2026 marks a shift towards stealthier operational fashions that prioritize steady monitoring over speedy exploitation.

The assault vector facilities on distributing the malware, packaged as a legitimate-looking Python script named “Lethalcompany.py,” to focus on methods.

All execution behaviour is hardcoded (Supply – Cyfirma)

As soon as executed, SolyxImmortal instantly establishes persistence by a number of mechanisms and launches background surveillance threads.

The malware doesn’t unfold laterally or propagate itself; as a substitute, it focuses solely on harvesting information from a single compromised gadget.

This targeted method allows attackers to keep up long-term visibility into person exercise with out drawing consideration.

Cyfirma analysts recognized SolyxImmortal as a complicated menace that leverages authentic Home windows APIs and trusted platforms for command-and-control communication.

Persistence Mechanism (Supply – Cyfirma)

The malware’s design displays operational maturity, emphasizing reliability and stealth over complexity.

By using Discord webhooks for information transmission, attackers exploit the platform’s popularity and HTTPS encryption to keep away from network-based detection.

This system demonstrates how menace actors more and more abuse authentic providers to cover malicious exercise.

Persistence Mechanism and Browser Credential Theft

The malware establishes persistence by copying itself to a hidden location inside the AppData listing, renaming it to resemble a authentic Home windows part.

It then registers itself within the Home windows registry Run key, guaranteeing computerized execution upon every person login with out requiring administrative privileges.

Doc and File Harvesting (Supply – Cyfirma)

This method ensures continued operation even after system restarts.

SolyxImmortal targets a number of browsers together with Chrome, Edge, Courageous, and Opera GX by accessing their profile directories.

The malware extracts browser grasp encryption keys utilizing Home windows DPAPI, then decrypts saved credentials by AES-GCM encryption.

Recovered credentials seem in plaintext format earlier than exfiltration, indicating minimal native safety measures.

The malware additionally harvests paperwork by scanning the person’s house listing for recordsdata with particular extensions like .pdf, .docx, and .xlsx, filtering outcomes by file dimension to keep away from community overhead.

Remaining information zip file (Supply – Cyfirma)

All stolen artifacts are compressed right into a ZIP archive and transmitted to attacker-controlled Discord webhooks, finishing the information theft cycle.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Data, Discord, Harvest, Leverages, Malware, PythonBased, Sensitive, Silently, SolyxImmortal

Post navigation

Previous Post: Critical AVEVA Software Vulnerabilities Enables Remote Code Execution Under System Privileges
Next Post: Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

Related Posts

Detecting Lateral Movement in Windows-Based Network Infrastructures Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News
Avoid Fake Traffic Ticket Sites Stealing Your Data Avoid Fake Traffic Ticket Sites Stealing Your Data Cyber Security News
Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery Cyber Security News
Cyber Threats Concealed by Compromised IoT Devices Cyber Threats Concealed by Compromised IoT Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark