Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PupkinStealer Targets Data Through Telegram

May 12, 2025
Reading Time: 2 mins read
in Alerts
Microsoft Copilot AI Exposes Sensitive Data

PupkinStealer is a new malware designed to steal sensitive user data such as browser credentials, desktop files, and messaging app sessions. Developed using C# and the .NET framework, it operates as a lightweight infostealer with a focus on fast data exfiltration. The malware has been active since April 2025 and leverages Telegram’s Bot API for command-and-control, taking advantage of the platform’s anonymity. Its ability to avoid detection and target specific data makes it a significant security threat for individuals and organizations.

PupkinStealer’s primary capabilities include extracting and decrypting credentials from Chromium-based browsers like Google Chrome and Microsoft Edge. It also steals files with specific extensions (.pdf, .txt, .jpg, etc.), and extracts session data from Telegram and Discord, enabling attackers to impersonate victims. In addition, it captures screenshots of the victim’s desktop for further exploitation. All the stolen data is compressed into a ZIP archive and sent to a Telegram bot controlled by the attackers, making it a highly effective tool for data exfiltration.

The malware is a 32-bit executable with a file size of 6.21 MB, written in .NET to ensure compatibility with both x86 and x64 environments.

It uses the Costura library to embed compressed DLLs, making it harder to detect. Key components of the malware include classes for credential extraction, desktop file harvesting, and Discord/Telegram data exfiltration. PupkinStealer also includes routines for taking screenshots and compressing the stolen data into ZIP files before sending them to the attacker-controlled bot.

To mitigate the risks associated with PupkinStealer, experts recommend implementing robust cybersecurity practices, such as avoiding untrusted files, using password managers, and deploying antivirus solutions.

Regular software updates and network monitoring can help detect unusual activity, such as data exfiltration to Telegram APIs. Additionally, organizations should train employees to recognize social engineering attacks and use multi-factor authentication (MFA) on platforms like Telegram and Discord to reduce the impact of this malware.

Reference:

  • PupkinStealer Malware Targets Sensitive Data Using Telegram for Exfiltration
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

Stealth Malware Targets Fortinet Firewalls

Spyware in App Stores Steals Your Photos

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

June 23, 2025
Stealth Malware Targets Fortinet Firewalls

Stealth Malware Targets Fortinet Firewalls

June 23, 2025
New Godfather Trojan Hijacks Banking Apps

Winos 4.0 Malware Hits Taiwan Via Tax Phish

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Godfather Trojan Hijacks Banking Apps

June 20, 2025
New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

June 20, 2025

Latest Alerts

Spyware in App Stores Steals Your Photos

Stealth Malware Targets Fortinet Firewalls

Prometei Botnet Attacks Servers for Crypto

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Godfather Trojan Hijacks Banking Apps

New Amatera Stealer Delivered By ClearFake

Subscribe to our newsletter

    Latest Incidents

    Aflac Hacked in Spree on Insurance Firms

    CoinMarketCap Doodle Hack Steals Crypto

    UK’s Oxford Council Legacy Systems Breached

    Massive Leak Exposes 16 Billion Credentials

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial