CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Gremlin infostealer evolves into modular stealer with anti-analysis and session hijacking capabilities

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A previously identified infostealer, Gremlin, has evolved into a modular threat actor toolkit with advanced evasion and session hijacking features. The malware now exfiltrates sensitive data including browser cookies, session tokens, clipboard contents, cryptocurrency wallet data, FTP and VPN credentials to a newly deployed server at 194.87.92.109. Key enhancements include anti-static analysis obfuscation via .NET Resource embedding and XOR encoding, Discord token extraction for social engineering, clipboard manipulation for cryptocurrency redirection, and WebSocket-based active session hijacking to bypass cookie protections.

Timeline

  1. 15.05.2026 17:19 1 articles · 0h ago

    Gremlin infostealer evolves into modular toolkit with advanced evasion and session hijacking

    A new variant of the Gremlin infostealer has been identified with modular architecture, enhanced obfuscation, and new attack capabilities. The malware now exfiltrates data to 194.87.92.109 and includes modules for extracting Discord tokens, performing cryptocurrency clipboard hijacking, and hijacking active browser sessions via WebSocket connections to bypass authentication protections.

    Show sources

Information Snippets