Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek

‘SolyxImmortal’ Information Stealer Emerges – SecurityWeek

Posted on January 19, 2026January 19, 2026 By CWS

A newly recognized info stealer depends on authentic APIs and third-party libraries for evasive, persistent information harvesting and exfiltration, cybersecurity firm Cyfirma studies.

Dubbed SolyxImmortal, the malware is written in Python and consists of broad information theft and person surveillance capabilities, corresponding to credential and doc harvesting, a keylogger, and display monitoring.

Based on Cyfirma, SolyxImmortal is a monolithic Python utility concentrating on Home windows methods that may launch concurrent surveillance and information assortment threads.

The malware runs silently within the background, doesn’t have self-propagation capabilities, and focuses on steady monitoring and alerting for authentication and different high-value person actions.

SolyxImmortal contains a central controller that establishes persistence, assortment, and surveillance, with all of the malicious habits hardcoded.

Command-and-control (C&C) parameters are additionally hardcoded. The infostealer makes use of two Discord webhooks, one for structured information exfiltration and one other for sending screenshots, and depends on the service’s HTTPS safety and repute to evade network-based detection.Commercial. Scroll to proceed studying.

“The inclusion of a hardcoded Discord person ID allows direct operator mentions, guaranteeing that high-value occasions generate speedy notifications,” Cyfirma notes.

The malware copies itself right into a listing inside the person’s AppData path and renames the executable, marking it as hidden and system-protected. It additionally registers beneath the person’s Run key, so it’s executed at person logon.

Information theft, surveillance capabilities

SolyxImmortal can steal credentials from Chrome and different Chromium-based browsers, concentrating on the Native State file to extract the browser grasp encryption key and decrypt the login entries.

“Recovered credentials are aggregated in plaintext format previous to exfiltration, indicating no native encryption or obfuscation of stolen information,” Cyfirma notes.

The risk additionally enumerates the person’s residence listing to determine paperwork of curiosity and filters them primarily based on extension and measurement. All collected information is staged in a short lived listing, compressed, and exfiltrated.

Moreover, the knowledge stealer shops captured keystrokes in an in-memory buffer and exfiltrates them periodically utilizing a devoted background thread.

It additionally displays the energetic home windows, checks their titles towards a predefined listing (concentrating on authentication and monetary operations), and takes a screenshot when figuring out a match. Every screenshot is straight away despatched to the devoted Discord webhook.

“Along with event-driven seize, routine screenshots are taken at mounted intervals, enabling steady visible surveillance even within the absence of set off key phrases,” Cyfirma explains.

After efficiently exfiltrating the staged information by way of HTTPS POST requests, the malware erases all momentary information and directories.

Designed for opportunistic assaults

Possible meant for low-to-medium sophistication risk actors, SolyxImmortal has been provided on an underground Telegram channel for sharing commodity malware and seems to have been developed by a Turkish-speaking risk actor.

Based mostly on the supposed developer’s underground exercise, Cyfirma believes the malware was designed for opportunistic information theft and surveillance. Nonetheless, it may be simply repurposed and redistributed by different risk actors.

“From a risk panorama perspective, this pattern displays a broader development of mid-tier risk actors leveraging available platforms and scripting languages to deploy efficient surveillance tooling with out sustaining devoted infrastructure,” Cyfirma notes.

Associated: VoidLink Linux Malware Framework Targets Cloud Environments

Associated: Infostealer Malware Delivered in EmEditor Provide Chain Assault

Associated: 136 NPM Packages Delivering Infostealers Downloaded 100,000 Instances

Associated: Widespread Infostealer Marketing campaign Focusing on macOS Customers

Security Week News Tags:Emerges, Information, SecurityWeek, SolyxImmortal, Stealer

Post navigation

Previous Post: Cyber Insights 2026: Information Sharing
Next Post: Jordanian Admits in US Court to Selling Access to 50 Enterprise Networks

Related Posts

Cybersecurity: Key Developments and Emerging Threats Cybersecurity: Key Developments and Emerging Threats Security Week News
Orion Secures M to Enhance Data Security Solutions Orion Secures $32M to Enhance Data Security Solutions Security Week News
QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland QNAP Patches Vulnerabilities Exploited at Pwn2Own Ireland Security Week News
3 Million Stolen in Cetus Protocol Hack $223 Million Stolen in Cetus Protocol Hack Security Week News
Data Breach at Conduent Exposes Volvo Group Employees Data Breach at Conduent Exposes Volvo Group Employees Security Week News
Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush Cyberattack Disrupts France’s Postal Service and Banking During Christmas Rush Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark