Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Posted on January 30, 2026January 30, 2026 By CWS

A classy PowerShell-based malware named TAMECAT has emerged as a important menace to enterprise safety, focusing on login credentials saved in Microsoft Edge and Chrome browsers.

This malware operates as a part of espionage campaigns carried out by APT42, an Iranian state-sponsored cyber-espionage group that has been actively focusing on high-value senior protection and authorities officers worldwide.

The menace demonstrates superior capabilities in credential theft, information exfiltration, and chronic entry to compromised techniques.

TAMECAT employs a multi-stage an infection course of that begins with social engineering ways.

The attackers impersonate trusted WhatsApp contacts and ship victims malicious hyperlinks that abuse the search-ms URI protocol handler.

As soon as activated, the malware downloads a VBScript that performs antivirus detection on the goal system to find out the suitable execution path.

Particulars Of TAMECAT’s capabilities (Supply – Pulsedive)

This preliminary reconnaissance permits the malware to adapt its deployment technique based mostly on the safety setting it encounters.

Pulsedive Menace Analysis analysts recognized TAMECAT as leveraging a number of command-and-control channels, together with Telegram bots, Discord, Firebase, and Cloudflare Staff infrastructure.

The malware’s modular structure allows it to obtain extra PowerShell scripts and execute varied instructions remotely.

Every module serves a particular goal, starting from browser credential extraction to display seize and file system crawling, making it a complete surveillance device.

The menace actors behind TAMECAT make the most of WebDAV servers to ship malicious LNK recordsdata disguised as PDF paperwork.

VBScript used to obtain TAMECAT (Supply – Pulsedive)

When executed, these recordsdata set off a series of occasions that set up persistence by logon scripts and registry run keys.

The malware communicates with its command-and-control infrastructure utilizing encrypted channels, using AES encryption with predefined keys to guard stolen information throughout transit.

This layered method to obfuscation makes detection considerably tougher for conventional safety instruments.

TAMECAT implements subtle strategies to extract login credentials from each Microsoft Edge and Chrome browsers.

The malware makes use of Microsoft Edge’s distant debugging characteristic to entry browser information whereas the applying is working.

For Chrome, TAMECAT suspends the browser course of briefly to achieve unrestricted entry to saved credential databases.

The decoded Borjol operate (Supply – Pulsedive)

This dual-capability method ensures the malware can harvest delicate authentication data no matter which browser the sufferer prefers.

The credential extraction module operates fully in reminiscence, leaving minimal forensic traces on the contaminated system.

Code that’s run based mostly on the response from the C2 server (Supply – Pulsedive)

As soon as credentials are collected, TAMECAT employs its Obtain Module and a specialised DLL element known as Runs.dll to chunk the stolen information into smaller segments earlier than exfiltration.

This segmentation technique helps the malware evade community monitoring instruments that may flag giant information transfers.

The exfiltration course of makes use of a number of channels concurrently, together with FTP and HTTPS protocols, offering redundancy in case one communication path turns into blocked or monitored.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Backdoor, Chrome, Credentials, Edge, Exfiltrates, Login, Microsoft, PowerShellBased, TAMECAT

Post navigation

Previous Post: Ex-Google Engineer Convicted of Stealing Google’s AI Secrets For China
Next Post: 175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Related Posts

Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware Cyber Security News
Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine Cyber Security News
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server Cyber Security News
Adblock Lists Can Reveal User Location Despite VPN Use Adblock Lists Can Reveal User Location Despite VPN Use Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News