Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Home/Threats/LofyStealer Targets Minecraft Players with Node. Targeted Using
Threats

LofyStealer Targets Minecraft Players with Node. Targeted Using

By analyzing public submissions, security researchers have linked a recent cyber campaign to the LofyGang group. This Brazilian-origin cybercrime organization was first identified by Checkmarx in...

Marcus Rodriguez
Marcus Rodriguez
April 29, 2026 3 Min Read
0 0

By analyzing public submissions, security researchers have linked a recent cyber campaign to the LofyGang group. This Brazilian-origin cybercrime organization was first identified by Checkmarx in October 2022.

The attribution is backed by hardcoded Brazilian Portuguese strings found inside the code, a C2 server hosted at a small Brazilian datacenter with the IP address 24.152.36.241, and the command-and-control panel branding itself as “LofyStealer, Advanced C2 Platform V2.0.”

Threat actors spread the malware entirely through social engineering. They package the malicious file as a Minecraft cheat called “Slinky” and use the game’s official icon to make it look completely legitimate.

This method works particularly well because Minecraft attracts a younger audience that is far more likely to download cheats or mods from unofficial sources.

Once the file is executed, the infection starts silently in the background with no visible warning signs shown to the user.

Infection Chain (Source - Zenox.ai)
Infection Chain (Source – Zenox.ai)

LofyStealer operates as a Malware-as-a-Service (MaaS) platform, offering Free and Premium tiers to criminal buyers through a web-based dashboard. Premium users gain full access to a victim management panel, a custom executable builder called “Slinky Cracked,” and real-time monitoring of compromised machines.

LofyStealer C2 Panel (Source - Zenox.ai)
LofyStealer C2 Panel (Source – Zenox.ai)

This structured business model reflects a mature and professionalized operation that has grown well beyond its early roots as a JavaScript supply chain attack distributed via the NPM package registry.

In-Memory Browser Injection: How LofyStealer Bypasses Security Tools

The most technically notable part of LofyStealer is the way its second-stage payload, chromelevator.exe, gets injected into active browser processes without triggering common security defenses.

Once the loader, load.exe, runs on the victim machine, it queries the Windows registry to locate installed browsers and then launches the identified browser in a suspended state, temporarily halting the process before it becomes fully active.

The loader then maps the payload directly into the browser’s memory space using kernel-level Windows calls. Rather than relying on common API functions that endpoint security products actively watch, it resolves low-level functions from ntdll.dll at runtime through direct syscalls.

This technique bypasses EDR and antivirus hooks that only monitor high-level KERNEL32.dll calls, giving the payload a clean and undetected path into the running browser process.

Once injected and fully active inside the browser, the payload extracts cookies, stored passwords, session tokens, payment card data, and IBANs across eight targeted browsers.

Stolen data is compressed using a hidden PowerShell command, encoded in Base64, and sent to the C2 server via an HTTP POST request with a SHA-256 integrity signature attached. The server then makes all stolen records available to operators through the live web dashboard.

Users and organizations should avoid downloading Minecraft mods, cheats, or game utilities from unofficial or untrusted sources, particularly those shared through Discord channels or unknown file-sharing sites.

Endpoint security solutions capable of detecting in-memory injection behavior offer stronger protection against this malware than traditional file-based scanning alone.

Multi-factor authentication should be enabled on all gaming, streaming, and financial accounts to reduce the risk of credential theft.

Security teams are advised to block outbound traffic to IP 24.152.36.241 on port 8080 and monitor systems for PowerShell execution running in hidden mode as a key behavioral indicator of compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Chrome Flaws Allow Remote Code Execution Attacks

Next Post

Vimeo Confirms Data Breach: Hackers Accessed User Database

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us