Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/Threats/SolyxImmortal Python Malware Steals Sensitive Data via
Threats

SolyxImmortal Python Malware Steals Sensitive Data via

SolyxImmortal has emerged as an information-stealing malware, marking a notable advancement in threats targeting Windows systems. This Python-based threat combines multiple data theft capabilities...

Jennifer sherman
Jennifer sherman
January 20, 2026 3 Min Read
0 0

SolyxImmortal has emerged as an information-stealing malware, marking a notable advancement in threats targeting Windows systems.

This Python-based threat combines multiple data theft capabilities into a single, persistent implant designed for long-term surveillance rather than destructive activity.

The malware operates silently in the background, collecting credentials, documents, keystrokes, and screenshots while sending stolen information directly to attackers through Discord webhooks.

Its emergence in January 2026 marks a shift toward stealthier operational models that prioritize continuous monitoring over rapid exploitation.

The attack vector centers on distributing the malware, packaged as a legitimate-looking Python script named “Lethalcompany.py,” to target systems.

All execution behaviour is hardcoded (Source - Cyfirma)
All execution behaviour is hardcoded (Source – Cyfirma)

Once executed, SolyxImmortal immediately establishes persistence through multiple mechanisms and launches background surveillance threads.

The malware does not spread laterally or propagate itself; instead, it focuses entirely on harvesting data from a single compromised device.

This focused approach enables attackers to maintain long-term visibility into user activity without drawing attention.

Cyfirma analysts identified SolyxImmortal as a sophisticated threat that leverages legitimate Windows APIs and trusted platforms for command-and-control communication.

Persistence Mechanism (Source - Cyfirma)
Persistence Mechanism (Source – Cyfirma)

The malware’s design reflects operational maturity, emphasizing reliability and stealth over complexity.

By utilizing Discord webhooks for data transmission, attackers exploit the platform’s reputation and HTTPS encryption to avoid network-based detection.

This technique demonstrates how threat actors increasingly abuse legitimate services to hide malicious activity.

Persistence Mechanism and Browser Credential Theft

The malware establishes persistence by copying itself to a hidden location within the AppData directory, renaming it to resemble a legitimate Windows component.

It then registers itself in the Windows registry Run key, ensuring automatic execution upon each user login without requiring administrative privileges.

Document and File Harvesting (Source - Cyfirma)
Document and File Harvesting (Source – Cyfirma)

This approach guarantees continued operation even after system restarts.

SolyxImmortal targets multiple browsers including Chrome, Edge, Brave, and Opera GX by accessing their profile directories.

The malware extracts browser master encryption keys using Windows DPAPI, then decrypts stored credentials through AES-GCM encryption.

Recovered credentials appear in plaintext format before exfiltration, indicating minimal local security measures.

The malware also harvests documents by scanning the user’s home directory for files with specific extensions like .pdf, .docx, and .xlsx, filtering results by file size to avoid network overhead.

Final data zip file (Source - Cyfirma)
Final data zip file (Source – Cyfirma)

All stolen artifacts are compressed into a ZIP archive and transmitted to attacker-controlled Discord webhooks, completing the data theft cycle.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

WhisperPair Attack Hijacks Laptops & Earbuds Allows Hijacking

Next Post

Critical AVEVA Flaws Allow Remote Code Execution with

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us