New Torg Grabber infostealer malware targets 728 crypto wallets
好的,用户让我帮忙总结一篇关于Torg Grabber恶意软件的文章,控制在100字以内。首先,我需要通读整篇文章,抓住关键点。 文章提到Torg Grabber是一种新型的信息窃取恶意软件,专门从850个浏览器扩展中窃取敏感数据,其中700多个是加密货币钱包。它通过ClickFix技术获取初始访问权限,劫持剪贴板并诱使用户执行恶意PowerShell命令。 此外,研究人员指出该恶意软件正在快速发展,三个月内编译了334个独特样本,并每周注册新的C2服务器。它还窃取密码管理器、双重认证工具和笔记应用的数据,并具备反分析机制和多层混淆技术。 最后,文章提到Torg Grabber针对多种浏览器和扩展程序,能够窃取凭证、Cookie、自动生成数据等,并具备执行加密shellcode的能力。 总结时要简洁明了,涵盖恶意软件的名称、主要功能、攻击目标以及其快速发展的特性。确保在100字以内准确传达核心信息。 </think> 一种名为Torg Grabber的新信息窃取恶意软件正在从850个浏览器扩展中窃取敏感数据,其中728个为加密货币钱包。该恶意软件通过劫持剪贴板并诱使用户执行恶意PowerShell命令获取初始访问权限,并具备快速进化能力,三个月内生成334个独特样本,每周注册新C2服务器。 2026-3-25 18:45:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

New Torg Grabber infostealer malware targets 728 crypto wallets

A new info-stealing malware called Torg Grabber is stealing sensitive data from 850 browser extensions, more than 700 of them for cryptocurrency wallets.

Initial access is obtained through the ClickFix technique by hijacking the clipboard and tricking the user into executing a malicious PowerShell command.

According to researchers at cybersecurity company Gen Digital, Torg Grabber is actively developed, with 334 unique samples compiled in three months (between December 2025 and February 2026) and new command-and-control (C2) servers registered every week.

Apart from cryptocurrency wallets, Torg Grabber steals data from 103 password managers and two-factor authentication tools, and 19 note-taking apps.

Rapid evolution

In a technical report this week, Gen Digital researchers say that Torg Grabber's initial builds used a Telegram-based and then a custom, encrypted TCP protocol for data exfiltration.

On December 18, 2025, the two mechanisms were abandoned in favor of an HTTPS connection routed through Cloudflare infrastructure. The method supports chunked data uploads and payload delivery.

Torg Grabber's development timeline
Torg Grabber's development timeline
Source: Gen Digital

The malware features several anti-analysis mechanisms, multi-layered obfuscation, and uses direct syscalls and reflective loading for evasion, running the final payload entirely in memory.

On December 22, 2025, Torg Grabber added App-Bound Encryption (ABE) bypass to beat Chrome’s (and Brave's, Edge's, Vivaldi's, and Opera's) cookie protection system, like many other information stealers.

However, the researchers also discovered a standalone tool called Underground, used for extracting browser data.

It injects a DLL reflectively into the browser to access Chrome’s COM Elevation Service and extract the master encryption key, a method also recently seen in VoidStealer.

Extensive data theft capabilities

Gen Digital found that Torg Grabber targets 25 Chromium-based browsers and 8 Firefox variants, trying to steal credentials, cookies, and autofill data.

Of the 850 browser extensions it targets, 728 are for cryptocurrency wallets, covering "essentially every crypto wallet ever conceived by human optimism."

"The marquee names are all there - MetaMask, Phantom, TrustWallet, Coinbase, Binance, Exodus, TronLink, Ronin, OKX, Keplr, Rabby, Sui, Solflare," the researchers say.

"But the list doesn’t stop at the big names. It keeps going, deep into the long tail, past projects with install counts you could fit in a phone booth."

Apart from wallets, the malware also targets a large list of 103 extensions for passwords, tokens, and authenticators: LastPass, 1Password, Bitwarden, KeePass, NordPass, Dashlane, ProtonPass, Enpass, Psono, Pleasant Password Server, heylogin, 2FAAuth, GAuth, TOTP Authenticator, and Akamai MFA.

Torg Grabber also targets information from Discord, Telegram, Steam, VPN apps, FTP apps, email clients, password managers, and desktop cryptocurrency wallet apps.

The malware can also profile the host, create a hardware fingerprint, document installed software (including 24 antivirus tools), take screenshots of the user’s desktop, and steal files from the Desktop/Documents folders.

Also notable is its capability to execute shellcode on the compromised device, delivered in ChaCha-encrypted zlib-compressed form from the C2.

Gen Digital cautions that Torg Grabber continues to develop rapidly, registering new C2 domains weekly, and that its operator base is expanding, with 40 tags documented by the time of analysis.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/
如有侵权请联系:admin#unsafe.sh