LIVE NEWS
  • Congress clashes with Pentagon over civilian harm reduction program
  • Rare plant makes comeback from brink of extinction
  • UK and France extend ‘one in, one out’ small boats pilot scheme until October | Immigration and asylum
  • Trump Adds Coinbase and Bitcoin Stocks to Portfolio
  • Gremlin Stealer Evolves into Modular Threat
  • Arizona Students Boo Ex-Google CEO Eric Schmidt During Graduation Speech
  • Charai for The Jerusalem Strategic Tribune: Trump in Beijing: Respect, Leverage, and the New Realism of U.S.–China Relations
  • Cotton Pushes Losses into the Friday Close
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Gremlin Stealer Evolves into Modular Threat
Cybersecurity

Gremlin Stealer Evolves into Modular Threat

primereportsBy primereportsMay 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Gremlin Stealer Evolves into Modular Threat
Share
Facebook Twitter LinkedIn Pinterest Email


A new version of the Gremlin stealer has evolved from a basic credential harvester into a modular toolkit, according to researchers at Palo Alto Networks’ Unit 42.

The infostealer first emerged in April 2025, now just 12 months later the threat has rapidly evolved with new obfuscation techniques and new anti-analysis safeguards into recent builds.

Gremlin stealer siphons sensitive information from compromised systems and exfiltrates it to attacker‑controlled servers for potential publication or sale. It targets web browsers, system clipboard and local storage.

The new variant has an increased focus on stealth and is specifically designed to evade static analysis tools, according to the research.

This includes the malware authors shifting the malicious payload into the .NET Resource section, masking it with XOR encoding to bypass signature-based detection and heuristic scanning.

The core architecture and exfiltration methods via private web panels or the Telegram Bot API remain consistent with older versions.

New Data Publication Site

The new variant exfiltrates stolen data to a newly deployed site (hxxp[:]194.87.92[.]109).

What is troubling is that Unit 42’s analysis said when it discovered the new data publication site, VirusTotal showed zero detection of the new site, its associated URLs or any retrieved artifacts. There were no block list entries, community reports or malicious categorizations.

After data theft, the malware bundles harvested artifacts into a ZIP archive, including:

  • Browser cookies
  • Session tokens
  • Clipboard contents
  • Cryptocurrency wallet data
  • FTP and VPN credentials

The malware names the file using the victim’s public IP address to identify the source and then uploads it to the attacker-controlled site.

Key Enhancements in Latest Gremlin Variant

Analysts at Palo Alto Networks’ Unit 42 say the latest variant now includes a dedicated module to extract Discord tokens, which can be used to target digital identities through social engineering attacks.

At the same time, the malware has taken a more aggressive turn financially. Researchers observed the addition of “crypto clipper” functionality, enabling Gremlin to actively interfere with cryptocurrency transactions.

By monitoring the victim’s clipboard for wallet addresses and swapping them with attacker-controlled addresses, the malware can redirect funds in real time without the user’s knowledge.

The updated version also introduces a WebSocket-based session hijacking capability, which allows attackers to hijack active browser sessions directly from the running process, bypassing modern cookie protections and giving them immediate access to authenticated accounts.

“This latest variant of Gremlin stealer represents an evolution into a more complex threat. By transitioning from a simple data exfiltration tool to a more advanced modular stealer, Gremlin now targets Chromium-based browsers,” the researchers noted.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleArizona Students Boo Ex-Google CEO Eric Schmidt During Graduation Speech
Next Article Trump Adds Coinbase and Bitcoin Stocks to Portfolio
primereports
  • Website

Related Posts

Cybersecurity

I didn’t expect Bose’s new lifestyle speaker to coexist with my Sonos Era 100 like this

May 16, 2026
Cybersecurity

Funnel Builder WordPress plugin bug exploited to steal credit cards

May 16, 2026
Cybersecurity

The Boring Stuff is Dangerous Now

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Cybersecurity
  • Popular Now
  • Crypto
  • Artificial Intelligence
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Congress clashes with Pentagon over civilian harm reduction program
  • Rare plant makes comeback from brink of extinction
  • UK and France extend ‘one in, one out’ small boats pilot scheme until October | Immigration and asylum
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.