Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Brazilian LofyGang Resurfaces After Three Years With Sophisticated Minecraft LofyStealer Campaign Targeting Young Users




Brazilian LofyGang has resurfaced after three years to launch a new campaign targeting Minecraft players, using a sophisticated stealer called LofyStealer (aka GrabBot). The malware masquerades as a Minecraft hack and is designed to steal sensitive data from multiple web browsers. This development marks a significant departure from previously observed tradecraft, as the group has begun using a malware-as-a-service model.

This campaign highlights an ongoing security challenge where widely trusted platforms are being abused to distribute malicious payloads. By utilizing social trust and common download channels, threat actors can often bypass traditional security solutions.

  • LofyGang, a Brazilian cybercrime group, has resumed its malicious activities with a new stealer called LofyStealer (aka GrabBot) targeting Minecraft users.
  • The malware masquerades as a Minecraft hack to deceive users and harvest sensitive data from multiple web browsers.
  • LofyGang's latest tactics include using a malware-as-a-service (MaaS) model, allowing users to access free and premium tiers of their tools.



  • A recent resurgence of a Brazilian cybercrime group, known as LofyGang, has been observed in the past few weeks. The group had initially gained notoriety three years ago for launching various malware campaigns targeting unsuspecting users, particularly those involved with Minecraft and Discord platforms. In this latest campaign, they have managed to orchestrate a new stealer called LofyStealer (also referred to as GrabBot), which poses a significant threat to young users who engage in gaming activities.

    According to information from Brazil-based cybersecurity firm ZenoX, the malware masquerades itself as a Minecraft hack known as "Slinky." This deception is achieved by utilizing the official game icon to induce voluntary execution among users. The trust placed in this particular campaign stems largely from its reliance on popular platforms and services like Minecraft, which has proven to be an effective vector for spreading malware.

    The LofyStealer (aka GrabBot) uses a sophisticated mechanism that exploits JavaScript loaders to execute the malicious software directly within the memory of compromised hosts. This approach allows it to bypass traditional security measures and harvest an extensive range of sensitive data from multiple web browsers, including Google Chrome, Microsoft Edge, Brave, Opera, Mozilla Firefox, Avast Browser, and others.

    This captured data, which includes cookies, passwords, tokens, credit card numbers (IBANs), and other valuable information, is subsequently transmitted to a command-and-control server located at 24.152.36[.]241. This setup illustrates the extent of LofyGang's technical expertise in crafting malware designed to efficiently exfiltrate sensitive data.

    Historically, LofyGang has employed several tactics for infecting users with malware, including:

    1. Utilizing JavaScript supply chain attacks by exploiting NPM package typosquatted repositories.
    2. Executing fraudulent references to legitimate GitHub repositories to inflate credibility and deceive users into installing malicious payloads.
    3. Embedding payloads in sub-dependencies of legitimate applications to evade detection.

    These tactics were initially used primarily for targeted phishing campaigns aimed at stealing Discord token credentials and other sensitive information associated with gaming, streaming services, and social media platforms.

    However, the latest development marks a significant departure from previously observed tradecraft, as LofyGang has begun using a malware-as-a-service (MaaS) model. This shift allows users to access both free and premium tiers of their tools, as well as an exclusive builder called Slinky Cracked used for delivering the stealer malware.

    Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads

    New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released

    OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

    Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities

    Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

    Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

    Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways

    Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation

    The Hidden Security Risks of Shadow AI in Enterprises

    Your MTTD Looks Great. Your Post-Alert Gap Doesn't

    Popular Resources

    Discover Key AI Security Gaps CISOs Face in 2026

    Fix Rising Application Security Risks Driven by AI Development

    Automate Alert Triage and Investigations Across Every Threat

    How to Identify Risky Browser Extensions in Your Organization

    Cybersecurity Webinars

    Building Stronger Defenses
    Stop Patient Zero Attacks Before They Bypass Detection
    Learn how to stop patient zero attacks before they bypass detection and compromise your systems at entry points.

    Register

    Reduce AppSec Risk
    Validate Real Attack Paths Before Attackers Exploit Them
    Learn how to validate real attack paths and reduce exploitable risk with continuous agentic security validation.
    Register

    Latest News

    Cybersecurity Resources

    Zscaler ThreatLabz 2026 VPN Risk Report With Cybersecurity Insiders.AI collapsed human response window and turned remote access into fastest path to breach.

    Your VPN is Helping Attackers Move as Fast as AIAI collapsed human response window and turned remote access into fastest path to breach.

    Earn a Master's in Cybersecurity Risk ManagementLead the future of cybersecurity risk management with an online Master’s from Georgetown.

    Expert Insights Articles

    Videos

    CTM360 Exposes Global GovTrap Campaign With 11,000+ Fake Government Portals Targeting Citizens Worldwide

    Work Moved Into the Browser. Security Didn't. AI Is Exposing the Gap

    Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation

    Why Your Backups Might Not Save You When Ransomware Hits

    Get Latest News in Your Inbox
    Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.

    Email

    Connect with us!

    1,110,000 Followers
    710,100 Followers
    24,800 Subscribers
    152,500 Followers
    1,990,000 Followers





    45,100 Followers





    Company

    About THN
    Advertise with us
    Contact



    Pages

    Webinars
    Awards
    Privacy Policy








     RSS Feeds
     Contact Us




    Related Information:
  • https://www.ethicalhackingnews.com/articles/Brazilian-LofyGang-Resurfaces-After-Three-Years-With-Sophisticated-Minecraft-LofyStealer-Campaign-Targeting-Young-Users-ehn.shtml

  • https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html

  • https://undercodetesting.com/lofystealer-the-memory-resident-malware-silently-draining-minecraft-accounts-video/

  • https://www.fortinet.com/blog/threat-research/grabbot-is-back-to-nab-your-data

  • https://malpedia.caad.fkie.fraunhofer.de/details/win.grabbot

  • https://checkmarx.com/blog/lofygang-software-supply-chain-attackers-organized-persistent-and-operating-for-over-a-year/


  • Published: Tue Apr 28 13:46:49 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us