PXA Stealer Malware Hits 62 Countries, Steals 200K Passwords

Python-Based PXA Stealer Malware Targets Thousands Globally Using Telegram for Data Theft and Resale

  • A new Python-based Malware campaign, named PXA Stealer, is targeting internet users worldwide.
  • Researchers link the activity to Vietnamese-speaking cybercriminals using Telegram for automation and data resale.
  • The malware has compromised over 4,000 unique IP addresses in 62 countries, stealing passwords, credit card details, and millions of browser cookies.
  • PXA Stealer uses advanced anti-detection methods, decoy content, and a protected command-and-control process.
  • Stolen data is sold on criminal markets, fueling large-scale operations in cryptocurrency theft and network breaches.

Cybersecurity experts have reported a global campaign spreading a Python-based information stealer called PXA Stealer. The attacks, active in 2025, are attributed to Vietnamese-speaking cybercriminal groups. These groups use Telegram APIs to automate the resale and reuse of stolen data.

- Advertisement -

Investigators from Beazley Security and SentinelOne announced that PXA Stealer has hit more than 4,000 unique IP addresses in 62 countries. Affected regions include South Korea, the United States, and several European countries. The malware harvested data such as over 200,000 unique passwords, hundreds of credit card records, and upwards of 4 million browser cookies.

According to security researchers Jim Walter, Alex Delamotte, Francisco Donoso, Sam Mayers, Tell Hause, and Bobby Venal, the malware demonstrates “a leap in tradecraft, incorporating more nuanced anti-analysis techniques, non-malicious decoy content, and a hardened command-and-control pipeline that frustrates triage and attempts to delay detection.” PXA Stealer was first detailed in late 2024 by Cisco Talos, where it was used to target government and educational sectors in Europe and Asia. The malware can steal passwords, browser autofill data, and information from cryptocurrency wallets and banks.

Stolen data is sent through Telegram channels before being sold on underground platforms such as Sherlock, a source of “stealer logs” used by other criminals. These logs allow downstream threat actors to commit cryptocurrency theft or gain unauthorized access to networks for future attacks.

The operation behind PXA Stealer has evolved, increasingly using DLL side-loading and complex staging to evade detection. Attackers present victims with decoy documents—like copyright notices—while the malware runs. The newest version targets Chromium-based browsers and extracts cookies by injecting malicious code into active browser processes, bypassing security measures. It also steals data from VPN clients, cloud tools, network shares, and communication platforms like Discord.

- Advertisement -

Researchers explain that “PXA Stealer uses the BotIDs (stored as TOKEN_BOT) to establish the link between the main bot and the various ChatID (stored as CHAT_ID)…primarily to host exfiltrated data and provide updates and notifications to the operators.” The campaign continues to develop, with its operators relying on a Telegram-based criminal market to distribute stolen victim data at scale.

For more technical details, see the SentinelOne analysis.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Top Aave DAO Developer Quits in “Devastating” Split.

Bored Ghosts Developing, a key Aave DAO contractor, will not renew its contract in...

Bitcoin Whale Selling Dominates Despite Easing Sell Pressure

Bitcoin exchange deposits have dropped from a peak of 60,000 BTC in early February...

Idle GPUs Key to Easing AI Compute Crunch

GPU prices for AI workloads have surged dramatically, with the NVIDIA RTX 5090 up...

Base Ditches Optimism, AI Exploits Surge

Base, founded by Coinbase, is leaving the Optimism stack to build its own chain,...

Bitcoin Whales Amass Holdings While Exchange Outflows Spike

Large Bitcoin holders, or "whales," have rebuilt their reserves to levels last seen before...

Must Read

7 Best Audiobooks on Cybersecurity

Cybersecurity has become an essential topic in our increasingly digital world. As technology evolves and becomes more integrated into our daily lives, the importance...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!