Close Menu
Mobile SpecsMobile Specs

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025
    Facebook X (Twitter) Instagram
    Mobile SpecsMobile Specs
    • Home
    • 5G Phones
    • Android vs iOS
    • Brands
    • Budget Phones
    • Compare
    • Flagships
    • Gaming Phones
    • New Launches
    Mobile SpecsMobile Specs
    Home»New Launches»200,000 passwords, credit card data and more theft – safer method through this dangerous new malware
    New Launches

    200,000 passwords, credit card data and more theft – safer method through this dangerous new malware

    mobile specsBy mobile specsAugust 5, 2025No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    200,000 passwords, credit card data and more theft – safer method through this dangerous new malware
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Hackers are now using the software and documents that you are now using to affect non -coherent users with malware that steal a new information capable of piloting your passwords, credit card data and more.

    As reported by Hacker News, it is believed that the new campaign is the job of Vietnamese -speaking cyber criminals who have begun deploying PXA Stellar Malware in their attacks.

    The first discovered by security researchers in Cisco Talos, PXA Steller is a stealing malware written in Azar. Although it was initially used to target government organizations and businesses throughout Europe and Asia, hackers behind this new campaign have changed the eyes of the common people in the United States, South Korea, the Netherlands, Hungary and Austria.

    You can like

    So far, Sentinelone has identified 4,000 unique IP addresses in 62 countries that have been affected by the PXA steeller. This special malware campaign has been made so dangerous that it can also use hackers and hackers to avoid how to steal passwords, cookies, credit card information and any automotive data, as well as any auto -out data stored in your browser, as well as hackers.

    You need to know everything about this new malware campaign, as well as with some points and tricks you know, to help you avoid being hunting.

    Silewing to avoid detection

    (Image Credit: Shutter Stock)

    In this new wave of attacks, hackers either cheated on potential victims to visit fashing sites or agreed to download the zip file, in addition to the signed copy of the free Heshusoft PDF reader, a malicious dynamic link library or DL file.

    As the security researchers of Sentinelone explain in their report, this malicious DL file is an integral part of the campaign because this is why the PXA allows Stellar Malware to establish perseverance through the Windows Registry on the affected systems. However, it is also used to download additional malicious components such as Windows Executionables, which are hosted from far away on file sharing sites like dropboxes.

    Get quick access to breaking news, the hottest reviews, big deals and helpful points.

    Once the PDF reader is installed and launched, it produces a malicious DL -based command line script that asks Microsoft’s Edge browser to open a PDF file full of viruses. Although the file does not actually open and the error message appears, the damage is done.

    In addition to using a free PDF reader as lure, hackers behind this campaign are using Microsoft Word 2013 to distribute PXA Stellar malware. This viable looks like your standard word file and is attached to emails but when opened, it uses a different malicious DLL file to achieve the same final purpose: impressing your computer with malware that steals information.

    To extract all stolen data from your computer, hackers are using the telegram as a phalastation channel behind this campaign. From there, all these stolen passwords, credit card data and other sensitive personal information are then sold on the Dark Web to use other cybercriminals in their attacks.

    How to stay safe from malware

    (Image Credit: Shutter Stock)

    You turn online these days, it looks like hackers are looking around for stealing your data, waiting around the corner waiting to impress your devices with malware.

    In this particular campaign, the hackers behind it used either fashing sites or malicious email attachments so that the unauthorized users could move. This is why you need to be more careful when checking your inbox.

    Don’t just click on any link you see in an email. Instead, you want to rotate your mouse in the link to see where it is taking you. If you don’t recognize the URL, do not click the link. Similarly, when the email is an email attachment, you always want to be careful when an unknown sender connects an email to an email he has sent to you. When there is a doubt, if you do not recognize the sender, do not download the attachment, even if it seems legitimate at first glance.

    Given that the PXA steeller and other malware stress often target the data in your browser, you should refrain from possessing sensitive information when possible. For example, instead of storing your browser your saved passwords, you should use an excellent password manager instead. The same is the case for your credit card details and other sensitive information.

    Although I usually recommend keeping your computer safe from the best anti -virus software, hackers behind this campaign used all kinds of smart tricks and techniques to avoid detecting their malware. In this case, it is up to you to use your best decision when clicking on the link or downloading files online. Nevertheless, you never have trouble using reliable antivirus to keep you safe from other viruses and threats.

    Given that the PXA Steller was first used to target governments and educational organizations before regular people, I don’t think this is the last thing we have yet seen about the malware that has stealing this information. Instead, other hackers can try to use this malware tension in future attacks.

    Process Tom’s leader on Google News Our latest news in our feeds, how, and get reviews. Make sure to click the follow button.

    More from Tom Guide

    Today’s Norton 360 with Life Lock Deals

    card Credit Dangerous data malware Method Passwords Safer theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe summary of the incoming notification of Android can avoid the losses of Apple Intelligence
    Next Article Relme P3 Ultra battery life and charging test results
    mobile specs
    • Website

    Related Posts

    Compare

    PNY MicroSD Express Card Review: A good value card with reputable write performance

    November 10, 2025
    Compare

    Lexar Play Pro MicroSD Express Card Review: The Ultimate Nintendo Switch 2 Storage Upgrade

    November 4, 2025
    Compare

    SanDisk MicroSD Express Card 2 for Nintendo Switch review: Simple storage expansion

    October 17, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Compare

    Honor Magic 8 Lite Review – gsmarena.com Test

    mobile specsDecember 8, 2025
    Compare

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    mobile specsDecember 8, 2025
    Compare

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    mobile specsDecember 8, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Our Picks

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    © 2026 MobileSpecs. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.