PXA Stealer Malware Hits 62 Countries, Steals 200K Passwords

Python-Based PXA Stealer Malware Targets Thousands Globally Using Telegram for Data Theft and Resale

  • A new Python-based Malware campaign, named PXA Stealer, is targeting internet users worldwide.
  • Researchers link the activity to Vietnamese-speaking cybercriminals using Telegram for automation and data resale.
  • The malware has compromised over 4,000 unique IP addresses in 62 countries, stealing passwords, credit card details, and millions of browser cookies.
  • PXA Stealer uses advanced anti-detection methods, decoy content, and a protected command-and-control process.
  • Stolen data is sold on criminal markets, fueling large-scale operations in cryptocurrency theft and network breaches.

Cybersecurity experts have reported a global campaign spreading a Python-based information stealer called PXA Stealer. The attacks, active in 2025, are attributed to Vietnamese-speaking cybercriminal groups. These groups use Telegram APIs to automate the resale and reuse of stolen data.

- Advertisement -

Investigators from Beazley Security and SentinelOne announced that PXA Stealer has hit more than 4,000 unique IP addresses in 62 countries. Affected regions include South Korea, the United States, and several European countries. The malware harvested data such as over 200,000 unique passwords, hundreds of credit card records, and upwards of 4 million browser cookies.

According to security researchers Jim Walter, Alex Delamotte, Francisco Donoso, Sam Mayers, Tell Hause, and Bobby Venal, the malware demonstrates “a leap in tradecraft, incorporating more nuanced anti-analysis techniques, non-malicious decoy content, and a hardened command-and-control pipeline that frustrates triage and attempts to delay detection.” PXA Stealer was first detailed in late 2024 by Cisco Talos, where it was used to target government and educational sectors in Europe and Asia. The malware can steal passwords, browser autofill data, and information from cryptocurrency wallets and banks.

Stolen data is sent through Telegram channels before being sold on underground platforms such as Sherlock, a source of “stealer logs” used by other criminals. These logs allow downstream threat actors to commit cryptocurrency theft or gain unauthorized access to networks for future attacks.

The operation behind PXA Stealer has evolved, increasingly using DLL side-loading and complex staging to evade detection. Attackers present victims with decoy documents—like copyright notices—while the malware runs. The newest version targets Chromium-based browsers and extracts cookies by injecting malicious code into active browser processes, bypassing security measures. It also steals data from VPN clients, cloud tools, network shares, and communication platforms like Discord.

- Advertisement -

Researchers explain that “PXA Stealer uses the BotIDs (stored as TOKEN_BOT) to establish the link between the main bot and the various ChatID (stored as CHAT_ID)…primarily to host exfiltrated data and provide updates and notifications to the operators.” The campaign continues to develop, with its operators relying on a Telegram-based criminal market to distribute stolen victim data at scale.

For more technical details, see the SentinelOne analysis.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Apple Releases Updates for Exploited Zero-Day Flaw

Apple has released emergency security updates for all major platforms including iOS, macOS, and...

Ethereum Staking Hits New Record: 36.8M ETH Locked

Ethereum's staking ratio has reached a new all-time high, surpassing 30% of its total...

Hoskinson: Midnight Mainnet March, Not for ‘Privacy Maxis’

Cardano founder Charles Hoskinson dismissed targeting privacy-focused communities for Midnight's launch.The new privacy blockchain...

Intel Rebounds 2.5% on AI Bet, Earnings Beat

Intel stock jumped 2.5% to $48.29, rebounding from a recent sharp decline driven by...

Coinbase Launches AI-Agent Wallet With Secured Keys

Coinbase launched a wallet built specifically for AI agents on its Base Network, aiming...

Must Read

Top 9 Most Legit Bitcoin Faucets

Bitcoin faucets are platforms where you can earn Bitcoin free. Some other faucet apps and websites allow users to receive different cryptocurrencies for free....
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!