Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PupkinStealer Targets Data Through Telegram

May 12, 2025
Reading Time: 2 mins read
in Alerts
Microsoft Copilot AI Exposes Sensitive Data

PupkinStealer is a new malware designed to steal sensitive user data such as browser credentials, desktop files, and messaging app sessions. Developed using C# and the .NET framework, it operates as a lightweight infostealer with a focus on fast data exfiltration. The malware has been active since April 2025 and leverages Telegram’s Bot API for command-and-control, taking advantage of the platform’s anonymity. Its ability to avoid detection and target specific data makes it a significant security threat for individuals and organizations.

PupkinStealer’s primary capabilities include extracting and decrypting credentials from Chromium-based browsers like Google Chrome and Microsoft Edge. It also steals files with specific extensions (.pdf, .txt, .jpg, etc.), and extracts session data from Telegram and Discord, enabling attackers to impersonate victims. In addition, it captures screenshots of the victim’s desktop for further exploitation. All the stolen data is compressed into a ZIP archive and sent to a Telegram bot controlled by the attackers, making it a highly effective tool for data exfiltration.

The malware is a 32-bit executable with a file size of 6.21 MB, written in .NET to ensure compatibility with both x86 and x64 environments.

It uses the Costura library to embed compressed DLLs, making it harder to detect. Key components of the malware include classes for credential extraction, desktop file harvesting, and Discord/Telegram data exfiltration. PupkinStealer also includes routines for taking screenshots and compressing the stolen data into ZIP files before sending them to the attacker-controlled bot.

To mitigate the risks associated with PupkinStealer, experts recommend implementing robust cybersecurity practices, such as avoiding untrusted files, using password managers, and deploying antivirus solutions.

Regular software updates and network monitoring can help detect unusual activity, such as data exfiltration to Telegram APIs. Additionally, organizations should train employees to recognize social engineering attacks and use multi-factor authentication (MFA) on platforms like Telegram and Discord to reduce the impact of this malware.

Reference:

  • PupkinStealer Malware Targets Sensitive Data Using Telegram for Exfiltration
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

PyPI Malware Steals AWS, CI/CD, macOS Data

PyPI Malware Steals AWS, CI/CD, macOS Data

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

Image Hiding in DNS TXT Records

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

June 16, 2025
VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

VexTrio TDS Uses Adtech To Spread Malware

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

Old Discord Links Now Lead To Malware

June 13, 2025

Latest Alerts

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Subscribe to our newsletter

    Latest Incidents

    Canada WestJet Airline Contains Cyberattack

    Hackers Leak 10K VirtualMacOSX Customer Data

    Washington Post Investigates Cyberattack on Emails

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial