Cybersecurity researchers have uncovered a newly analyzed Python-based information stealer known as VVS Stealer (also marketed as VVS $tealer), which is designed to specifically target Discord users. The malware focuses on harvesting sensitive data such as authentication tokens, account credentials, browser-stored information, and active session details that can be abused for account takeover. Actively promoted and sold through Telegram channels, VVS Stealer reflects the continued commoditization of infostealer malware within underground ecosystems. Its operators emphasize ease of deployment and stealth, positioning the malware as a low-barrier tool for cybercriminals seeking to compromise user accounts and monetize stolen data. Technically, VVS Stealer is written in Python and has reportedly been available for sale since at least April 2025. To evade detection and frustrate analysis, the developers rely on PyArmor, a legitimate Python obfuscation framework repurposed to conceal the malware’s source code and execution logic. The stealer is packaged using PyInstaller, allowing it to be distributed as a standalone Windows executable without requiring Python to be installed on the victim system. This approach improves its portability and increases its success rate among less technical victims, while also complicating traditional signature-based security controls that rely on cleartext scripts. Upon execution, VVS Stealer establishes persistence by copying itself into the Windows Startup folder, ensuring it runs automatically after system reboots. To disguise malicious behavior, it displays fake “Fatal Error” pop-ups that prompt users to restart their machines. The malware then begins data collection, targeting Discord tokens and credentials, browser passwords, cookies, browsing history, autofill data, and screenshots of the victim’s desktop. Additionally, VVS Stealer conducts Discord injection attacks by terminating the Discord process and retrieving an obfuscated JavaScript payload from a remote server. This payload leverages the Chrome DevTools Protocol to monitor network traffic, enabling session hijacking and deeper account compromise.
A critical vulnerability in F5 BIG-IP Access Policy Manager (APM) is being actively exploited, with over 14,000 exposed instances identified by Shadowserver. Initially classified a...
Cisco has issued a high-priority security alert concerning a critical flaw in its Smart Software Manager On-Prem (SSM On-Prem) platform, identified as CVE-2026-20160. The vulnerabi...
Modern fraud operations are evolving beyond traditional cyberattacks by leveraging legitimate services and physical-world infrastructure to execute highly effective schemes. Instea...