Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Typhon Reborn V2: Improved Malware

April 6, 2023
Reading Time: 2 mins read
in Alerts

 

The criminal behind Typhon Reborn, an information-stealing malware, has returned with an updated version, known as V2. The latest version has enhanced capabilities to resist analysis and evade detection, and it is available for purchase on the criminal underground for a monthly fee of $59, a yearly fee of $360, or a lifetime subscription of $540.

V2 is a stealer that can collect and exfiltrate sensitive data and send the stolen data to attackers using the Telegram API.

Typhon Reborn was initially reported in November 2022 by Palo Alto Networks Unit 42. The new version removes some of the previous version’s features, including keylogging and cryptocurrency mining, to reduce the risk of detection.

V2 malware is also based on another stealer malware called Prynt Stealer, and it can deploy the XMRig cryptocurrency miner. The malware is equipped to siphon passwords and cookies from Chromium-based web browsers, along with data from instant messaging, gaming, and crypto wallet apps.

Besides incorporating more anti-analysis and anti-virtualization checks, the new version removes its persistence features, opting instead to terminate itself after exfiltrating data.

The V2 variant was offered for sale by its developer on January 31, 2023, on the Russian-language dark web forum XSS. The malware is capable of avoiding infecting systems located in the Commonwealth of Independent States (CIS) countries but excludes Ukraine and Georgia from the list.

The malware’s collected data is transmitted in a compressed archive via HTTPS using the Telegram API, marking continued abuse of the messaging platform. The archive is deleted from the infected system after the data has been successfully transmitted to the attacker, and the malware then calls a self-delete function to terminate execution.

Cyble has disclosed another Python-based stealer malware, named Creal, that targets cryptocurrency users through phishing sites resembling legitimate crypto mining services such as Kryptex.

The malware is equipped to siphon cookies and passwords from Chromium-based web browsers, data from instant messaging, gaming, and crypto wallet apps, and can exfiltrate data using Discord webhooks and file-hosting and sharing platforms such as Anonfiles and Gofile.

 

Reference:
  • Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities

Tags: April 2023CISCyber AlertCyber Alerts 2023Cyber AttacksMalwareTyphon Reborn
ADVERTISEMENT

Related Posts

FIN6 Uses Fake Resumes To Hack Recruiters

FIN6 Uses Fake Resumes To Hack Recruiters

June 11, 2025
Microsoft Fixes Exploited WebDAV Zero Day

Microsoft Fixes Exploited WebDAV Zero Day

June 11, 2025
Fake Sora AI Lure Installs Infostealer

Fake Sora AI Lure Installs Infostealer

June 11, 2025
New Skitnet Malware Arms Ransomware Gangs

Google Bug Exposed Any User’s Phone Number

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

Roundcube RCE Flaw Risks 84,000 Servers

June 10, 2025
New Skitnet Malware Arms Ransomware Gangs

New Skitnet Malware Arms Ransomware Gangs

June 10, 2025

Latest Alerts

Fake Sora AI Lure Installs Infostealer

FIN6 Uses Fake Resumes To Hack Recruiters

Microsoft Fixes Exploited WebDAV Zero Day

Google Bug Exposed Any User’s Phone Number

Roundcube RCE Flaw Risks 84,000 Servers

New Skitnet Malware Arms Ransomware Gangs

Subscribe to our newsletter

    Latest Incidents

    BHA Hit By Ransomware But Races Continue

    Sompo Data Breach Puts 17.5M Records At Risk

    DDoS Disrupts Roularta Media In Belgium

    Texas DOT Breach Leaks 300K Crash Reports

    Illinois HFS Employee Phishing Leaks Data

    Cyberattack Disrupts UNFI Food Deliveries

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial