Torg Grabber infostealer expands to 850 browser extensions including 728 crypto wallets
Summary
Hide ▲
Show ▼
A new info-stealing malware family named Torg Grabber has been identified targeting 850 browser extensions, with over 700 focused on cryptocurrency wallets. Initial access is achieved via the ClickFix technique, involving clipboard hijacking and user tricked into executing malicious PowerShell commands. The malware rapidly evolves, with 334 unique samples compiled in three months and weekly registration of new command-and-control (C2) servers. Torg Grabber employs advanced anti-analysis, multi-layered obfuscation, direct syscalls, and reflective loading to evade detection. It exfiltrates data over HTTPS via Cloudflare, supports chunked uploads, and includes mechanisms to bypass browser cookie protection. The malware targets credentials, cookies, autofill data, and files from 25 Chromium-based browsers and 8 Firefox variants, alongside a wide range of applications including password managers, 2FA tools, messaging platforms, VPNs, and desktop crypto wallets.
Timeline
-
25.03.2026 20:32 1 articles · 2h ago
Torg Grabber infostealer expands targeting to 850 browser extensions with advanced exfiltration and anti-detection mechanisms
Torg Grabber infostealer malware was identified targeting 850 browser extensions, including 728 cryptocurrency wallet extensions, with initial access via ClickFix clipboard hijacking and PowerShell command execution. The malware rapidly evolved from Telegram and custom TCP exfiltration to HTTPS over Cloudflare infrastructure on December 18, 2025, supporting chunked uploads. By December 22, 2025, it added App-Bound Encryption bypass to circumvent browser cookie protections. Torg Grabber employs anti-analysis, multi-layered obfuscation, direct syscalls, reflective loading, and executes payloads entirely in memory. It also profiles hosts, extracts browser encryption keys via a standalone tool named Underground, and targets a wide range of applications beyond wallets, including password managers, 2FA tools, messaging platforms, VPNs, FTP clients, and email clients.
Show sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
Information Snippets
-
Torg Grabber targets 850 browser extensions, including 728 cryptocurrency wallet extensions such as MetaMask, Phantom, TrustWallet, Coinbase, Binance, Exodus, TronLink, Ronin, OKX, Keplr, Rabby, Sui, and Solflare.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
Initial access is obtained via the ClickFix technique, which hijacks the clipboard and tricks users into executing malicious PowerShell commands.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
The malware has 334 unique samples compiled between December 2025 and February 2026, with new C2 servers registered weekly.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
Data exfiltration initially used Telegram-based and custom encrypted TCP protocols but shifted to HTTPS routed through Cloudflare infrastructure on December 18, 2025, supporting chunked data uploads.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
Torg Grabber features anti-analysis mechanisms, multi-layered obfuscation, direct syscalls, and reflective loading for evasion, executing payloads entirely in memory.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
On December 22, 2025, Torg Grabber added App-Bound Encryption (ABE) bypass to circumvent Chrome’s (and similar browsers’) cookie protection systems.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
The malware targets 25 Chromium-based browsers and 8 Firefox variants, stealing credentials, cookies, autofill data, and files from desktop folders.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
Torg Grabber also targets 103 password manager and 2FA extensions (e.g., LastPass, 1Password, Bitwarden, KeePass, NordPass, Dashlane, ProtonPass, Enpass), alongside applications including Discord, Telegram, Steam, VPNs, FTP clients, email clients, and desktop crypto wallets.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
The malware profiles the host, creates hardware fingerprints, documents installed software (including 24 antivirus tools), takes desktop screenshots, and executes shellcode delivered in ChaCha-encrypted zlib-compressed form from the C2.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32
-
A standalone tool named Underground is used to extract browser data by injecting a DLL reflectively into the browser to access Chrome’s COM Elevation Service and extract the master encryption key.
First reported: 25.03.2026 20:321 source, 1 articleShow sources
- New Torg Grabber infostealer malware targets 728 crypto wallets — www.bleepingcomputer.com — 25.03.2026 20:32