Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/Threats/Phishing ZIP Files Deploy PXA Stealer Hackers Against
Threats

Phishing ZIP Files Deploy PXA Stealer Hackers Against

A new wave of cyberattacks has placed financial institutions globally on high alert. Threat actors are aggressively deploying PXA Stealer, a potent information-stealing malware, against organizations...

David kimber
David kimber
March 27, 2026 3 Min Read
0 0

A new wave of cyberattacks has placed financial institutions globally on high alert. Threat actors are aggressively deploying PXA Stealer, a potent information-stealing malware, against organizations across the world.

The surge follows law enforcement’s successful dismantling of major infostealer operations, including Lumma, Rhadamanthys, and RedLine, throughout 2025.

With those platforms gone, PXA Stealer has moved in to fill the gap, with researchers estimating its activity grew by 8 to 10 percent during the first quarter of 2026.

These campaigns use phishing emails carrying malicious URLs that direct victims to download ZIP files packed with hidden malware.

The attackers use a wide range of decoy documents to lure targets — from fake resumes and Adobe Photoshop installers to tax forms and legal paperwork.

This variety ensures the threat can reach employees across many departments in a financial organization, making it difficult to defend against with one-size-fits-all email filters.

CyberProof analysts and threat researchers identified this growing campaign during Q1 2026, noting its deliberate focus on global financial institutions.

Their investigation centered on a campaign cluster tied to a bot identifier labeled “Verymuchxbot,” which differed in several key ways from publicly reported PXA Stealer activity from August 2025.

By tracing the full kill chain — from the first phishing email through to final data theft — the team was able to document exactly how the malware reaches its target.

PXA Stealer is built to quietly collect browser credentials, saved passwords, and cryptocurrency wallet data from infected machines.

After harvesting this information, it sends everything to the attacker through Telegram channels, which helps the outbound traffic avoid scrutiny.

The malware also writes a registry entry to ensure it keeps running even after the machine is restarted, giving attackers long-term access to the compromised system.

What sets this campaign apart is how naturally it blends into normal system activity. The attackers use legitimate Windows tools and rename files to match trusted process names, reducing the chance of detection.

As PXA Stealer’s reach continues to expand, organizations in the financial sector face a growing, real risk to their data.

Inside the Infection Chain

The attack starts when a victim is tricked into downloading a ZIP archive named Pumaproject.zip from the domain downloadtheproject[.]xyz.

The archive contains a file called Document.docx.exe, designed to look like a harmless Word document.

When the victim runs it, the malware springs into action, extracting a Python interpreter, several Python libraries, and malicious scripts, while creating a hidden folder called “Dots” to store the remaining attack components. 

Kill Chain of the Investigated PXA Stealer Incident (Source - CyberProof)
Kill Chain of the Investigated PXA Stealer Incident (Source – CyberProof)

Inside the “Dots” folder, the attackers store a legitimate WinRar binary renamed as picture.png, alongside an encrypted archive disguised as Shodan.pdf.

The Windows tool certutil decodes this file, after which the WinRar binary unpacks the archive using the password “shodan2201”. 

Certutil.exe Deobfuscates Content from Shodan.pdf (Source - CyberProof)
Certutil.exe Deobfuscates Content from Shodan.pdf (Source – CyberProof)

Its contents land in C:UsersPublicWindowsSecure, and the Python interpreter is renamed to svchost.exe to pass as a trusted Windows process. 

Python Interpreter Dropped as svchost.exe (Source - CyberProof)
Python Interpreter Dropped as svchost.exe (Source – CyberProof)

A heavily obfuscated Python script, disguised as images.png, is then launched with the $BOT_ID argument pointing to “Verymuchxbot.”

The script hooks into the victim’s browsers to intercept credentials and crypto wallet data during active sessions.

PXA Stealer Hooks to Steal User Data (Source - CyberProof)
PXA Stealer Hooks to Steal User Data (Source – CyberProof)

All stolen data is finally sent out over Telegram to attacker-controlled channels. Security teams should monitor emails for suspicious URLs and ZIP or RAR attachments, especially those with file names suggesting invoices, bills, or job-related content.

Outbound connections to top-level domains such as .xyz, .shop, .info, and .net should be blocked, with source file context always reviewed.

Traffic directed toward third-party messaging apps like Telegram should be audited for unauthorized data movement.

EDR alerts for process injection should be treated with urgency, and CTI feeds along with threat hunting queries should be kept current to detect emerging infostealer threats before they cause damage.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Telnyx PyPI Package With 742,000 downloads Compromised in TeamPCP

Next Post

Hackers Deploy BRUSHWORM and BRUSHLOGGER Against South Asian

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us