Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek

‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek

Posted on January 19, 2026January 19, 2026 By CWS

A newly recognized info stealer depends on authentic APIs and third-party libraries for evasive, persistent information harvesting and exfiltration, cybersecurity firm Cyfirma studies.

Dubbed SolyxImmortal, the malware is written in Python and consists of broad information theft and person surveillance capabilities, corresponding to credential and doc harvesting, a keylogger, and display monitoring.

Based on Cyfirma, SolyxImmortal is a monolithic Python utility concentrating on Home windows methods that may launch concurrent surveillance and information assortment threads.

The malware runs silently within the background, doesn’t have self-propagation capabilities, and focuses on steady monitoring and alerting for authentication and different high-value person actions.

SolyxImmortal contains a central controller that establishes persistence, assortment, and surveillance, with all of the malicious habits hardcoded.

Command-and-control (C&C) parameters are additionally hardcoded. The infostealer makes use of two Discord webhooks, one for structured information exfiltration and one other for sending screenshots, and depends on the service’s HTTPS safety and repute to evade network-based detection.Commercial. Scroll to proceed studying.

“The inclusion of a hardcoded Discord person ID allows direct operator mentions, guaranteeing that high-value occasions generate speedy notifications,” Cyfirma notes.

The malware copies itself right into a listing inside the person’s AppData path and renames the executable, marking it as hidden and system-protected. It additionally registers beneath the person’s Run key, so it’s executed at person logon.

Information theft, surveillance capabilities

SolyxImmortal can steal credentials from Chrome and different Chromium-based browsers, concentrating on the Native State file to extract the browser grasp encryption key and decrypt the login entries.

“Recovered credentials are aggregated in plaintext format previous to exfiltration, indicating no native encryption or obfuscation of stolen information,” Cyfirma notes.

The risk additionally enumerates the person’s residence listing to determine paperwork of curiosity and filters them primarily based on extension and measurement. All collected information is staged in a short lived listing, compressed, and exfiltrated.

Moreover, the knowledge stealer shops captured keystrokes in an in-memory buffer and exfiltrates them periodically utilizing a devoted background thread.

It additionally displays the energetic home windows, checks their titles towards a predefined listing (concentrating on authentication and monetary operations), and takes a screenshot when figuring out a match. Every screenshot is straight away despatched to the devoted Discord webhook.

“Along with event-driven seize, routine screenshots are taken at mounted intervals, enabling steady visible surveillance even within the absence of set off key phrases,” Cyfirma explains.

After efficiently exfiltrating the staged information by way of HTTPS POST requests, the malware erases all momentary information and directories.

Designed for opportunistic assaults

Possible meant for low-to-medium sophistication risk actors, SolyxImmortal has been provided on an underground Telegram channel for sharing commodity malware and seems to have been developed by a Turkish-speaking risk actor.

Based mostly on the supposed developer’s underground exercise, Cyfirma believes the malware was designed for opportunistic information theft and surveillance. Nonetheless, it may be simply repurposed and redistributed by different risk actors.

“From a risk panorama perspective, this pattern displays a broader development of mid-tier risk actors leveraging available platforms and scripting languages to deploy efficient surveillance tooling with out sustaining devoted infrastructure,” Cyfirma notes.

Associated: VoidLink Linux Malware Framework Targets Cloud Environments

Associated: Infostealer Malware Delivered in EmEditor Provide Chain Assault

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Instances

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Emerges, Information, SecurityWeek, SolyxImmortal, Stealer

Post navigation

Previous Post: Cyber Insights 2026: Information Sharing
Next Post: Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Related Posts

US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes US Storms 29 Laptop Farms in Crackdown on North Korean IT Worker Schemes Security Week News
OpenAI Expands AI Security with Promptfoo Acquisition OpenAI Expands AI Security with Promptfoo Acquisition Security Week News
VMware Flaws That Earned Hackers 0,000 at Pwn2Own Patched VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News
Backslash Secures M to Enhance Vibe Coding Protection Backslash Secures $19M to Enhance Vibe Coding Protection Security Week News
Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations Security Week News
Ransomware Group Claims Attack on Beer Giant Asahi Ransomware Group Claims Attack on Beer Giant Asahi Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark