Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Torg Grabber Stealer Evolves to Encrypted API C2

Torg Grabber Stealer Evolves to Encrypted API C2

Posted on March 26, 2026 By CWS

A novel Malware-as-a-Service (MaaS) credential stealer called Torg Grabber has emerged, showcasing significant advancements within just a few months. Initially, this malware used simple Telegram-based techniques for data extraction but has quickly transitioned to a more sophisticated encrypted REST API command-and-control (C2) system.

Rapid Development of Torg Grabber

In a brief period, Torg Grabber compiled 334 samples, with over 40 confirmed operator tags identified in its binaries. This indicates its active role in facilitating multiple criminal groups, highlighting the organized nature of this builder-based cybercrime operation.

The malware derives its name from one of its primary C2 domains, technologytorg.com, with “torg” translating to “trade” or “marketplace” in Russian, aptly describing its purpose in dealing with stolen credentials. Initially misidentified as Vidar Stealer, further analysis revealed it as a 64-bit PE compiled with MinGW-GCC, distinct from Vidar’s 32-bit MSVC build.

Evolution Through Exfiltration Techniques

Gen Digital’s Threat Research Team analyzed and officially named the malware, noting its evolution through three exfiltration phases. Early builds utilized the Telegram Bot API for sending stolen ZIP files to private Telegram channels, offering a rapid deployment method with minimal infrastructure.

Subsequent versions briefly adopted a raw TCP socket protocol with custom encryption before transitioning to a production-grade REST API over HTTPS through Cloudflare. This shift complicates traffic interception and blocks, indicating a move towards more secure and resilient communication methods.

Data Collection and Prevention Measures

Torg Grabber casts a wide net, targeting credentials from numerous browsers, including 25 Chromium-based and 8 Firefox-family browsers. It also collects over 850 browser extensions, encompassing cryptocurrency wallets and two-factor authentication tools, while also capturing session data from platforms like Discord, Telegram, and Steam.

Before initiating data collection, the malware checks for antivirus signatures across various security products. Multiple operator tags were traced to active Telegram accounts associated with Russian-speaking cybercrime networks. The malware employs a multi-stage loader chain, beginning with a dropper disguised as game cheats or cracked software, which subsequently downloads and activates the stealer in-memory, evading detection.

To mitigate risks, users should avoid unofficial downloads, and IT teams should monitor for suspicious PowerShell commands and unexpected BITS Transfer activities. Endpoint tools must be configured to detect direct syscall usage and in-memory PE loading patterns. Organizations using Chromium-based browsers should ensure proper configuration of App-Bound Encryption, with any unexpected browser process suspensions flagged as potential compromises.

Stay informed by following us on Google News, LinkedIn, and X for more updates, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:API security, browser security, command-and-control, credential stealer, cyber threat, Cybercrime, Cybersecurity, data exfiltration, Encryption, MaaS, Malware, malware detection, online safety, REST API, Torg Grabber

Post navigation

Previous Post: BIND Updates Address Critical Security Vulnerabilities
Next Post: Post-Quantum Cryptography and AI Vulnerabilities: A Security Update

Related Posts

SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed Cyber Security News
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters Cyber Security News
Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News
Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Conflict Intensifies Amid Iran and US-Israeli Tensions Cyber Security News
Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware Cyber Security News
Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws
  • Post-Quantum Cryptography and AI Vulnerabilities: A Security Update
  • Torg Grabber Stealer Evolves to Encrypted API C2
  • BIND Updates Address Critical Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Highlights Exploited Langflow Code Injection Flaw
  • Cisco Addresses Critical IOS Security Flaws
  • Post-Quantum Cryptography and AI Vulnerabilities: A Security Update
  • Torg Grabber Stealer Evolves to Encrypted API C2
  • BIND Updates Address Critical Security Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark