Thursday, April 30, 2026

BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data

A new Windows stealer dubbed BoryptGrab is being distributed through a large, ongoing campaign abusing fake GitHub repositories that pose as free tools, game cheats, and popular utilities.

The malware focuses on stealing browser data, cryptocurrency wallet information, and system details, while also grabbing screenshots, common files, Telegram data, Discord tokens, and stored passwords.

Attackers created more than a hundred public GitHub repositories using SEO‑stuffed READMEs so that search engines rank them near legitimate projects.

These repositories advertise items such as “Voicemod Pro download tool,” “Valorant performance boost,” “CS2 skin changers,” and other cracked or cheat‑style tools, often using ZIP filenames with or without “github-io” in their names to appear trustworthy.

When victims follow the README link, they are redirected through GitHub‑hosted pages containing Russian comments and base64/AES‑based URL redirection logic, eventually landing on a fake GitHub download page that dynamically generates a malicious ZIP archive.

README page for the malicious Voicemod Pro Github repository (Source : TrendAI).
README page for the malicious Voicemod Pro Github repository (Source : TrendAI).

The campaign dates back at least to April 2025, based on repository commits, with ZIP samples seen from late 2025, indicating an active and maturing ecosystem rather than a short‑lived operation.

Inside the ZIP, the infection can begin either via a DLL side‑loading chain or via a VBS/PowerShell downloader that pulls a launcher executable from attacker‑controlled infrastructure.

These launchers frequently talk to servers on port 5466 and can pass “build names” such as Shrek, Leon, CryptoByte, Sonic, or Yaropolk to request specific payloads and track infection branches.

BoryptGrab Malware

In one route, an executable side‑loads a malicious libcurl.dll that decrypts an embedded launcher payload using XOR plus AES‑CBC, then runs it to download the main BoryptGrab stealer as well as optional extra payloads.

VBS scripts that decode PowerShell commands, add Microsoft Defender exclusions, and fetch a C/C++ launcher which then retrieves BoryptGrab via HTTP.

Additional variants employ a .NET stub that embeds a base64‑encoded VBS downloader, or include a Golang‑based downloader called HeaconLoad directly inside the ZIP.

HeaconLoad persists via Run‑key registry entries and scheduled tasks, beacons to the attacker via HTTP POST on port 8088 with system info and a hardcoded tag, and when instructed, downloads and unzips bundles, executing the first binary inside.

The infrastructure can also deliver obfuscated Vidar stealer variants via an /api/custom_exe?build={BUILD_NAME} endpoint, using XOR‑encrypted strings, opaque predicates, and dynamic API resolution to hinder analysis while exfiltrating data in Vidar‑style HTTP POST traffic.

Attack chain for the BoryptGrab campaign (Source : TrendAI).
 Attack chain for the BoryptGrab campaign (Source : TrendAI).

Certain chains further deploy TunnesshClient, a PyInstaller‑packed backdoor that establishes a reverse SSH tunnel to attacker servers.

TunnesshClient first requests a challenge and credentials over HTTP, derives SSH keys, and then sets up remote port forwarding so attackers can run commands, list and exfiltrate files, upload data, or use the victim as a SOCKS5 proxy.

One variant instead spins up a local SSH server on the victim and forwards credentials to the operator, who can then pivot traffic through the compromised host.

What BoryptGrab steals and why it matters

BoryptGrab itself is a C/C++ information stealer with anti‑VM and anti‑analysis checks that inspect registry keys, VM artifacts, and process names before proceeding.

URLs vary across the GitHub repositories we identified, similar Russian-language comments and URL-fetching logic were also present in other GitHub repositories we found for this campaign.

Fake Github download page that generates the malicious ZIP file (Source : TrendAI).
Fake Github download page that generates the malicious ZIP file (Source : TrendAI).

It supports command‑line arguments such as –output-path to control where it stores loot and –build-name to tag each infection, falling back to defaults or hardcoded identifiers (for example CryptoByte, Shrek, Sonic, Yaropolk, and others) when no value is provided.

The stealer focuses heavily on browser credential theft, targeting Chrome, Edge, Firefox, Opera, Brave, Vivaldi, Yandex, and others, and integrates code from public GitHub projects that bypass Chrome App‑Bound Encryption to decrypt stored passwords.

It loads an encrypted internal payload (PAYLOAD_DLL) that handles browser data extraction and also logs installed applications along with a hardcoded timestamp.


The launcher payload sends the build name argument to the downloaded BoryptGrab stealer (Source : TrendAI).
The launcher payload sends the build name argument to the downloaded BoryptGrab stealer (Source : TrendAI).

For cryptocurrency, BoryptGrab searches directories for many popular desktop wallets and extensions, including Exodus, Electrum, Ledger Live, Atomic, Binance, Wasabi, Trezor, and dozens more, then collects wallet files, captures a screenshot, and gathers system information.

Beyond credentials and wallets, BoryptGrab runs a “Filegraber” module to harvest files with specific extensions from common folders, steals Telegram data, and in newer builds also captures Discord tokens to expand account takeover opportunities.

Finally, it compresses all collected data and uploads it to the attacker’s server; in some variants it then pulls and launches TunnesshClient to establish longer‑term remote access over encrypted SSH tunnels.

Russian‑language comments and log strings observed in multiple malware components, plus IP addresses located in Russia, suggest a likely Russian‑speaking threat actor behind this campaign, though formal attribution remains unconfirmed.

For defenders, the combination of SEO‑poisoned GitHub repositories, layered downloaders, multiple stealers, and SSH‑based backdoors highlights the need to treat “free” development tools and cheat utilities as high‑risk, enforce application control, and closely monitor outbound HTTP and SSH traffic for suspicious patterns tied to this evolving threat.

Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

OpenAI Unveils Cyber Defense Roadmap Focused on AI-Powered Security

OpenAI has released a comprehensive cyber defense roadmap titled...

Attackers Exploit cPanel Authentication Bypass 0-Day After PoC Release

A critical zero-day vulnerability, tracked as CVE-2026-41940, is currently...

Jenkins Plugin Updates Fix Path Traversal and Stored XSS Bugs

The Jenkins project released a critical security advisory addressing...

Qinglong Task Scheduler RCE Flaws Exploited in the Wild

Hackers are actively exploiting two severe authentication bypass vulnerabilities...

Compromised SAP npm Packages Found Harvesting Developer and CI/CD Secrets

Security researchers have identified a severe supply chain attack...

SonicWall SonicOS Flaw Lets Attackers Bypass Access Controls and Crash Firewalls

SonicWall has released a security advisory detailing three new...

ProFTPD SQL Injection Flaw Opens Door To Remote Code Execution Attacks

A newly disclosed flaw in ProFTPD is drawing urgent...

Related Articles

Recent News