New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data
PXA Stealer malware surges 10% in Q1 2026, targeting banks via phishing and Telegram exfiltration.
Summary
CyberProof researchers detected an 8-10% spike in PXA Stealer attacks on financial institutions in Q1 2026, likely filling the gap left by takedowns of RedLine and Lumma infostealers in 2025. The malware spreads via phishing emails with attachments like Pumaproject.zip, hides in a folder named 'Dots' using password 'shodan2201', and steals browser credentials, crypto private keys, and financial data before exfiltrating via Telegram using a BOT_ID tracker called 'Verymuchxbot'. The malware achieves persistence through registry modifications to restart on each system reboot.
Full text
Security MalwareNew PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate DatabyDeeba AhmedMarch 26, 20262 minute read CyberProof researchers have detected a 10% surge in PXA Stealer attacks targeting financial institutions in Q1 2026. Learn how this malware uses phishing and Telegram to steal passwords and crypto. Financial firms across the globe are facing a fresh wave of digital break-ins this year. According to cyber threat detection firm CyberProof, a relatively new malware known as the PXA Stealer has seen a sudden spike in activity. During the first quarter of 2026, experts tracked an 8% to 10% increase in attacks using this specific tool. However, this spike isn’t a coincidence because it follows the high-profile police takedowns of older infostealers like RedLine and Lumma in 2025. This indicates that PXA has stepped in to take their place. In a report shared with Hackread.com, CyberProof threat intelligence experts noted that these new campaigns are becoming increasingly adaptable, switching between different disguises to trick employees. How the Infection Spreads The scam usually starts with a simple phishing email that isn’t always obvious junk mail and often looks like legitimate messages about tax forms, legal documents, or even Adobe Photoshop installers. One common version involves a file named Pumaproject.zip. When a curious user opens it, the trap is set. Further research reveals that the hackers use a multi-layered approach to stay hidden. The malware creates a secret folder on the computer named Dots and uses a specific password, shodan2201, to unpack its most dangerous components. To a casual observer, the computer might look fine because the virus renames its main files to svchost.exe, a name used by standard Windows processes, to blend into the background. PXA Stealer kill chain (Image source: CyberProof) What Data is at Risk The attackers are mainly targeting user credentials and crypto wallets. Once inside, the PXA Stealer quietly starts harvesting saved login passwords from web browsers, private keys from cryptocurrency wallets, and sensitive data from specific financial websites. It is worth noting that the hackers even use a digital tracking tag, or BOT_ID, known as Verymuchxbot, to organise their stolen goods. According to researchers, the stolen data is eventually sent back to the criminals via Telegram channels. To make matters worse, the malware achieves persistence by adding a value registry entry. This means it is programmed to restart itself every time the computer is turned on. PXA Stealer hooks to steal user data (Image source: CyberProof) Staying Safe The best defence is a healthy dose of scepticism. Experts suggest being extremely wary of emails with attachments ending in .zip or .rar, particularly if they claim to be urgent invoices. Monitoring for unusual background connections to web addresses ending in .xyz or .shop can also help catch an infection before the data leaves the building. It is also a good idea to watch out for files with names like .vbs or .js that pop up unexpectedly. Deeba Ahmed Deeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform’s trusted coverage. View Posts CyberProofCybersecurityInfostealerMalwarePXA Stealer Leave a Reply Cancel reply View Comments (0) Related Posts News Android Crypto Malware Security “GodFather” Hits Banks, Crypto Wallets Apps as Android Trojan Emerges Researchers believe that GodFather could be a successor of another banking trojan called Anubis, which had its source code leaked in January 2019 on an underground hacking forum. byDeeba Ahmed Security Anonymous Cyber Attacks OpIcarus continues as hacktivists shut down 3 more banking websites The online hacktivist Anonymous and Ghost Squad Attackers are targeting banking websites worldwide for operation OpIcarus. Though they have… byWaqas Malware Security Surveillance Smartphones of Iran’s protest detainees targeted with spyware The malware has been identified as I3mon, which can perform all kinds of spying operations. byWaqas Security Malware The Pirate Bay’s preferred cryptominer Coinhive shutting down next week The Pirate Bay was caught twice secretly mining Monero cryptocurrency using Javascript powered by Coinhive. Popular in-browser crypto-mining service… byWaqas
Indicators of Compromise
- malware — PXA Stealer
- malware — Verymuchxbot