Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/HoneyMyte Updates CoolClient Malware to Steal Browser Data
Threats

HoneyMyte Updates CoolClient Malware to Steal Browser Data

Also known as Mustang Panda or Bronze President, the HoneyMyte threat group continues to pose a significant risk to government organizations across Asia and Europe. Recent security research has...

Emy Elsamnoudy
Emy Elsamnoudy
January 28, 2026 3 Min Read
0 0

Also known as Mustang Panda or Bronze President, the HoneyMyte threat group continues to pose a significant risk to government organizations across Asia and Europe.

Recent security research has revealed that this advanced hacker collective is actively upgrading its digital arsenal with enhanced versions of malware designed to steal sensitive information from targeted systems.

The group’s operations have been particularly concentrated in Southeast Asia, where government agencies remain the primary targets of their sophisticated campaigns.

In 2025, security experts discovered that HoneyMyte significantly expanded its toolset by improving the CoolClient backdoor malware with new capabilities.

Variants of CoolClient abusing different software for DLL sideloading (2021–2025) (Source - Securelist)
Variants of CoolClient abusing different software for DLL sideloading (2021–2025) (Source – Securelist)

Beyond the CoolClient upgrades, the group deployed several variants of a specialized browser login data stealer and utilized multiple scripts intended for harvesting confidential documents and gathering system details.

This evolution demonstrates the group’s commitment to developing more effective tools for extracting valuable data from compromised networks.

Overview of CoolClient execution flow (Source - Securelist)
Overview of CoolClient execution flow (Source – Securelist)

Securelist analysts noted that the malware operates through a multi-stage delivery system that relies on DLL sideloading, a technique where legitimate software files are hijacked to load malicious code.

The malware has been observed in countries including Myanmar, Mongolia, Malaysia, Russia, and Pakistan.

Between 2021 and 2025, HoneyMyte abused legitimate applications from vendors such as BitDefender, VLC Media Player, and Sangfor to execute its malicious payload.

The Browser Credential Stealer and Detection Evasion

One of the most concerning developments involves HoneyMyte’s new browser credential stealer, which specifically targets login information stored in popular web browsers.

The group deployed at least three variants of this stealer across different campaigns. Variant A targets Google Chrome, Variant B focuses on Microsoft Edge, and Variant C supports multiple Chromium-based browsers including Brave and Opera.

Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration (Source - Securelist)
Function that copies Chrome browser login data into a temporary file (chromeTmp) for exfiltration (Source – Securelist)

This flexibility allows attackers to harvest credentials regardless of which browser users prefer on compromised machines.

The stealer operates by copying the target browser’s login database and configuration files to temporary folders, then using Windows security features to decrypt stored passwords.

The malware extracts encrypted master keys from browser files, decrypts them using Windows Data Protection Application Programming Interface functions, and reconstructs complete login records containing usernames and passwords.

After gathering this sensitive information, the malware saves the harvested credentials to hidden system folders for later exfiltration to attacker-controlled servers.

This capability, combined with other features like keylogging and clipboard monitoring, reveals HoneyMyte’s transition toward active surveillance of victim systems beyond traditional espionage objectives.

Organizations operating in government sectors should implement strong detection measures and maintain vigilant monitoring for signs of CoolClient backdoor infections, browser stealer activity, and related malware families used by this determined threat actor.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

OpenSSL Flaws Allow Remote Attackers to Execute Code

Next Post

Malicious Chrome Extensions Steal ChatGPT Login Data

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us