New Snake Keylogger Attacking Chrome, Edge, and Firefox Users

Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new information-stealing malware called FrigidStealer. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The malware employs AutoIt scripting, process hollowing, and multi-channel exfiltration to bypass traditional defenses, making it one of the most persistent keyloggers observed this year. With Snake Keylogger’s evolving tactics, layered defenses integrating AI and threat intelligence remain critical to safeguarding sensitive data. A sophisticated new variant of the Snake Keylogger (detected as Autolt/Injector.GTY!tr) has emerged as a critical threat to Windows users. Upon execution, Snake Keylogger deploys an AutoIt-compiled binary (ageless.exe) to the %Local_AppData%\supergroup directory, hiding its presence through hidden attributes. By suspending the process, unmapping its memory, and loading malicious code, Snake Keylogger evades signature-based detection. FortiSandbox v5.0’s PAIX engine detected the threat through behavioral analysis and static heuristics, identifying embedded APIs and network anomalies. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. FortiGuard Labs reports over 280 million blocked infection attempts since January 2025, with concentrated attacks in China, Turkey, Indonesia, Taiwan, and Spain. The malware injects its payload into RegSvcs.exe, a legitimate .NET process, using process hollowing. It leverages advanced evasion techniques to steal sensitive data from Chrome, Edge, and Firefox browsers. Educate users on phishing risks via security platforms.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 20 Feb 2025 00:20:12 +0000


Cyber News related to New Snake Keylogger Attacking Chrome, Edge, and Firefox Users

New Snake Keylogger Attacking Chrome, Edge, and Firefox Users - Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new ...
10 months ago Cybersecuritynews.com
New SSH-Snake Malware Abuses SSH Credentials - Threat actors abuse SSH credentials to gain unauthorized access to systems and networks. SSH credential abuse provides a stealthy entry point for threat actors to compromise and control the targeted systems. On January 4th, 2024, the Sysdig Threat ...
1 year ago Cybersecuritynews.com
Edge Computing: Data and Connectivity - Edge computing is a distributed computing model that brings processing capabilities closer to the data source, be it IoT devices, sensors, or end-user devices, rather than relying on centralized data centers. By decentralizing data processing, edge ...
2 years ago Feeds.dzone.com
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials - A sophisticated phishing campaign targeting Turkish defense and aerospace enterprises has emerged, delivering a highly evasive variant of the Snake Keylogger malware through fraudulent emails impersonating TUSAŞ (Turkish Aerospace Industries). ...
5 months ago Cybersecuritynews.com
Snake Keyloggers Abuse Java Utilities to Evade Security Tools - A sophisticated phishing campaign leveraging the Snake Keylogger malware has emerged, exploiting legitimate Java debugging utilities to bypass security mechanisms and target organizations worldwide. When executed, the malware utilizes DLL sideloading ...
5 months ago Cybersecuritynews.com
Edge Computing: Enhancing Data Processing - Edge computing revolutionizes data processing by bringing computational power closer to where data is generated, enhancing efficiency and responsiveness. Discover how edge computing is reshaping technology and our interactions with it, unlocking a ...
1 year ago Securityzap.com
Google Online Security Blog: Sustaining Digital Certificate Security - The Chrome Security Team prioritizes the security and privacy of Chrome's users, and we are unwilling to compromise on these values. The Chrome Root Program Policy states that CA certificates included in the Chrome Root Store must provide value to ...
1 year ago Security.googleblog.com
CVE-2024-54092 - A vulnerability has been identified in Industrial Edge Device Kit - arm64 V1.17 (All versions), Industrial Edge Device Kit - arm64 V1.18 (All versions), Industrial Edge Device Kit - arm64 V1.19 (All versions), Industrial Edge Device Kit - arm64 V1.20 ...
8 months ago
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment - The decrypted payload is then injected into RegSvcs.exe using process hollowing techniques, allowing the VIP keylogger to execute within a legitimate Windows process and evade behavioral detection systems. These files serve distinct purposes in the ...
4 months ago Cybersecuritynews.com
Top 10 Malware Threats of the Week, April 2025 - A recent analysis by cybersecurity platform ANY.RUN has revealed the top 10 malware threats dominating the digital landscape over the past week, with information stealers Lumma and Snake showing significant increases in activity. The surge in malware ...
8 months ago Cybersecuritynews.com
SUSE announces new enhancements to help users manage business-critical workloads - SUSE announced enhancements across its cloud native and Edge portfolio to enable customers to securely deploy and manage business-critical workloads anywhere. New capabilities in Rancher Prime 3.0, SUSE's commercial offering of Rancher and SUSE Edge ...
1 year ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Apple 'Find My' network can be abused to steal keylogged passwords - Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. The Find My network and application is designed to help users locate lost or misplaced ...
2 years ago Bleepingcomputer.com
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition - Rhadamanthys and Lumma, alongside other stealer malware families like Meduza, StealC, Vidar, and WhiteSnake, have also been found releasing updates in recent weeks to collect cookies from the Chrome web browser, effectively bypassing newly introduced ...
1 year ago Thehackernews.com
Integrated Industrial Edge Compute - The future of edge compute is more like a locomotive with a predictable future. In early 2023 Grand View Research identified that the edge compute market had grown from $1.9B in 2020 to $11.24B in 2022. These edge compute numbers may explain my ...
2 years ago Feedpress.me
Cloud Edge: The New Attack Surface - As enterprises increasingly adopt cloud edge computing, a new and complex attack surface emerges, demanding heightened security measures. Cloud edge combines cloud resources with edge computing to process data closer to its source, enhancing speed ...
3 months ago Darkreading.com
Google Patches Another Chrome Zero-Day as Browser Attacks Mount - For the fourth time since August, Google has disclosed a bug in its Chrome browser technology that attackers were actively exploiting in the wild before the company had a fix for it. Integer Overflow Bug The latest zero-day, which Google is tracking ...
2 years ago Darkreading.com CVE-2023-6345 CVE-2023-4863 CVE-2023-5217 CVE-2023-28205 CVE-2023-32409 CVE-2023-28204 CVE-2023-32373
Google Chrome adds new AI features to boost productivity and creativity - Google's popular web browser, Chrome, is getting a makeover with the latest release of Chrome M121, which introduces three new generative AI features that aim to make browsing easier, more efficient and more personalized. The new features, which are ...
1 year ago Venturebeat.com
User-Friendly Update: Clear Your Chrome History on Android with Ease - As part of its commitment to keeping users happy, Google Chrome prioritizes providing a great experience - one of the latest examples of this is a new shortcut that makes it easier to clear browsing data on Android. Chrome has made deleting users' ...
1 year ago Cysecurity.news
Google Chrome Zero-Day Bug Under Attack, Allows Code Injection - Google has patched a high-severity zero-day bug in its Chrome Web browser that attackers are actively exploiting. The vulnerability, assigned as CVE-2024-0519, is the first Chrome zero-day bug that Google has disclosed in 2024, and the second in the ...
1 year ago Darkreading.com CVE-2024-0519 CVE-2024-0517 CVE-2024-0518 Hunters
Mozilla warns users to update Firefox before certificate expires - Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company's root certificates. "On 14 March a root certificate (the ...
9 months ago Bleepingcomputer.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
2 years ago Go.theregister.com
Locking down the edge The Register - Review and manage your consent Here's an overview of our use of cookies, similar technologies and how to manage them. The attack surface is expanding as more operational functions migrate out of centralized locations and into distributed sites and ...
1 year ago Go.theregister.com