Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

PupkinStealer Targets Data Through Telegram

May 12, 2025
Reading Time: 2 mins read
in Alerts
Microsoft Copilot AI Exposes Sensitive Data

PupkinStealer is a new malware designed to steal sensitive user data such as browser credentials, desktop files, and messaging app sessions. Developed using C# and the .NET framework, it operates as a lightweight infostealer with a focus on fast data exfiltration. The malware has been active since April 2025 and leverages Telegram’s Bot API for command-and-control, taking advantage of the platform’s anonymity. Its ability to avoid detection and target specific data makes it a significant security threat for individuals and organizations.

PupkinStealer’s primary capabilities include extracting and decrypting credentials from Chromium-based browsers like Google Chrome and Microsoft Edge. It also steals files with specific extensions (.pdf, .txt, .jpg, etc.), and extracts session data from Telegram and Discord, enabling attackers to impersonate victims. In addition, it captures screenshots of the victim’s desktop for further exploitation. All the stolen data is compressed into a ZIP archive and sent to a Telegram bot controlled by the attackers, making it a highly effective tool for data exfiltration.

The malware is a 32-bit executable with a file size of 6.21 MB, written in .NET to ensure compatibility with both x86 and x64 environments.

It uses the Costura library to embed compressed DLLs, making it harder to detect. Key components of the malware include classes for credential extraction, desktop file harvesting, and Discord/Telegram data exfiltration. PupkinStealer also includes routines for taking screenshots and compressing the stolen data into ZIP files before sending them to the attacker-controlled bot.

To mitigate the risks associated with PupkinStealer, experts recommend implementing robust cybersecurity practices, such as avoiding untrusted files, using password managers, and deploying antivirus solutions.

Regular software updates and network monitoring can help detect unusual activity, such as data exfiltration to Telegram APIs. Additionally, organizations should train employees to recognize social engineering attacks and use multi-factor authentication (MFA) on platforms like Telegram and Discord to reduce the impact of this malware.

Reference:

  • PupkinStealer Malware Targets Sensitive Data Using Telegram for Exfiltration
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

Apple Warns Users As CERT-FR Confirms

Former Feds Targeted By Chinese Jobs

September 12, 2025
Apple Warns Users As CERT-FR Confirms

CHILLYHELL And ZynorRAT Threaten Systems

September 12, 2025
Apple Warns Users As CERT-FR Confirms

Apple Warns Users As CERT-FR Confirms

September 12, 2025
SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025

Latest Alerts

Former Feds Targeted By Chinese Jobs

CHILLYHELL And ZynorRAT Threaten Systems

Apple Warns Users As CERT-FR Confirms

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Subscribe to our newsletter

    Latest Incidents

    Panama Economy Ministry Reports Breach

    LNER Warns Customers Of Data Breach

    Hello Gym Leak Exposes Member Audio

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial