Vietnamese Hackers Target 4,000 IPs, Steal 200,000 Passwords with PXA Stealer

Published:

spot_img

Understanding the Rise of PXA Stealer: A Threat to Cybersecurity

Cybersecurity experts are raising alarms about a new trend in cybercrime involving a sophisticated Python-based information stealer known as PXA Stealer. This malware is primarily attributed to cybercriminals who communicate in Vietnamese, and it operates within an intricate underground network that profits from stolen information through automated resales facilitated via Telegram APIs.

The Mechanics Behind PXA Stealer

According to a comprehensive report by Beazley Security and SentinelOne shared with The Hacker News, this malware campaign integrates advanced strategies to make detection challenging. Experts including Jim Walter, Alex Delamotte, and their colleagues have noted that the attackers employ sophisticated anti-analysis techniques, create non-malicious decoy content, and utilize a robust command-and-control infrastructure. These tactics are designed to complicate detection processes and hinder security analysts from responding effectively.

Scale of Impact

Since its emergence, PXA Stealer has compromised more than 4,000 unique IP addresses across 62 countries, including significant infections in South Korea, the United States, the Netherlands, Hungary, and Austria. The data compromised by this malware is extensive, comprising over 200,000 unique passwords, hundreds of credit card numbers, and more than 4 million browser cookies.

Initially documented by Cisco Talos in November 2024, PXA Stealer has targeted various sectors, particularly government and education institutions across Europe and Asia. This malware can gather not only passwords and autofill data from browsers but also critical information from cryptocurrency wallets and online banking services.

How Stolen Data is Exploited

Once harvested, the data stolen by PXA Stealer is sent through Telegram to criminal platforms like Sherlock, where it’s auctioned to other cybercriminals. These individuals use the purchased information for malicious activities such as cryptocurrency theft or strategic infiltration into organizations. This process fosters a large-scale cybercriminal ecosystem that continuously exploits stolen data for illicit gain.

Evolving Tactics of Cybercriminals

The methods used to deploy this malware have evolved significantly in 2025. Cybercriminals have begun employing dynamic techniques, such as DLL side-loading and additional layers of staging to conceal their activities. The malicious DLL not only facilitates the infection process but also distracts victims with decoy documents, like notices about copyright infringements, to mask the malware’s true intent.

Advanced Data Extraction Capabilities

This latest iteration of PXA Stealer includes enhanced features that allow it to pull cookies from Chromium-based browsers by inserting a DLL into running applications, effectively bypassing application-bound encryption measures. Furthermore, it extracts data from various sources, including VPN clients, cloud CLI utilities, shared file systems, and even applications like Discord.

Communication and Coordination Among Cybercriminals

Researchers highlight that PXA Stealer utilizes distinct identifiers, such as BotIDs (stored as TOKEN_BOT) and ChatIDs (stored as CHAT_ID), to ensure effective communication between the main bot and various Telegram channels. These channels not only host the exfiltrated data but also provide real-time updates and alerts to the operators involved in the scheme.

In the current cyber landscape, threats like PXA Stealer reflect a complex and organized effort by Vietnamese-speaking hackers tied to a larger market within Telegram that specializes in trading stolen data. This evolution illustrates the alarming sophistication of cybercrime today, necessitating vigilant security measures and continuous monitoring to mitigate risks associated with such hazards.

spot_img

Related articles

Recent articles

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888)

Ubuntu 24.04 and Later Exposed to Critical Local Privilege Escalation Vulnerability (CVE-2026-3888) The Qualys Threat Research Unit has uncovered a significant Local Privilege Escalation (LPE)...

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems

IT/OT Convergence Reshapes Cybersecurity Priorities for Critical Operational Systems The convergence of Information Technology (IT) and Operational Technology (OT) is fundamentally altering the landscape of...

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors

Cyberattacks Surge 245% Amid Iran War, Targeting Banks and Fintech Sectors Since the onset of the Iran war, cyber activity associated with the conflict has...

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations

Cohesity Advances AI Resilience with Enhanced Data Protection and Security Solutions for Midsize Organizations Cohesity has unveiled a series of significant enhancements to its data...