Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BoryptGrab Malware Exploits Over 100 GitHub Repositories

BoryptGrab Malware Exploits Over 100 GitHub Repositories

Posted on March 7, 2026 By CWS

A new cyber threat identified as BoryptGrab is leveraging a network of over 100 GitHub repositories to spread its malicious software, according to cybersecurity firm Trend Micro. This malware poses a significant risk by targeting sensitive data from various sources including web browsers and cryptocurrency wallets.

Characteristics of the BoryptGrab Stealer

BoryptGrab is designed to extract a wide range of information from infected systems. It can gather data from numerous web browsers and cryptocurrency wallet applications, while also collecting system details and user files. Furthermore, some versions of BoryptGrab are capable of deploying a backdoor called TunnesshClient, which facilitates command-and-control communication through an SSH tunnel.

Trend Micro’s research uncovered that BoryptGrab disguises itself as free software tools within ZIP archives on GitHub, a tactic it has used since late 2025. These archives share common characteristics, such as Russian-language comments and URL-fetching logic, although the methods of execution vary across different instances.

Technical Details and Execution Methods

The BoryptGrab malware utilizes multiple strategies for execution, including DLL sideloading and VBS scripts to launch its executables. Observations also included the use of a .NET executable and a Golang downloader known as HeaconLoad. This variety in execution methods reflects the malware’s adaptability and sophistication.

Additionally, BoryptGrab incorporates advanced checks to evade detection, such as VM and anti-analysis tests, and attempts to run with elevated privileges. It employs Chrome App Bound Encryption techniques and downloads a Chromium helper to gather data from targeted browsers. The malware also harvests files from desktop cryptocurrency wallets and browser extensions.

Impact and Security Implications

The BoryptGrab campaign highlights a growing threat to users who unknowingly download deceptive software from seemingly legitimate GitHub repositories. This operation is part of a broader trend towards more sophisticated and engineered cyber threats. Trend Micro notes that the evolving nature of BoryptGrab, including its ability to obtain Telegram files, browser passwords, and Discord tokens, indicates a significant advancement in malware capabilities.

In conclusion, the BoryptGrab malware campaign underscores the importance of maintaining robust cybersecurity measures and vigilance against deceptive software downloads. Users are encouraged to exercise caution when accessing software repositories and to implement comprehensive security solutions to protect against such threats.

Security Week News Tags:BoryptGrab, crypto wallets, cyber threat, Cybersecurity, GitHub, information stealer, Malware, SSH tunnel, Trend Micro, TunnesshClient

Post navigation

Previous Post: Malicious Chrome Extension Targets Crypto Wallets
Next Post: Anthropic AI Unearths Firefox Security Flaws

Related Posts

8 Cybersecurity Acquisitions Surpassed  Billion Mark in 2025 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025 Security Week News
US Offers  Million Reward for Ukrainian Ransomware Operator US Offers $10 Million Reward for Ukrainian Ransomware Operator Security Week News
Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector Security Week News
Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Security Week News
Zero Networks Raises  Million for Microsegmentation Solution Zero Networks Raises $55 Million for Microsegmentation Solution Security Week News
Managing Technical Debt in AI-Driven Software Development Managing Technical Debt in AI-Driven Software Development Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Anthropic AI Unearths Firefox Security Flaws
  • BoryptGrab Malware Exploits Over 100 GitHub Repositories
  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Anthropic AI Unearths Firefox Security Flaws
  • BoryptGrab Malware Exploits Over 100 GitHub Repositories
  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News