Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

January 6, 2026

New Zealand Orders Review of Manage My Health Breach

January 5, 2026

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

January 5, 2026
Facebook X (Twitter) Instagram
Tuesday, January 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»VVS Stealer Uses Advanced Obfuscation to Target Discord Users
News

VVS Stealer Uses Advanced Obfuscation to Target Discord Users

Team-CWDBy Team-CWDJanuary 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A Python-based malware family known as VVS stealer has been observed using advanced obfuscation and stealth techniques to target Discord users and extract sensitive data.

The malware, also styled as VVS $tealer, was previously marketed for sale on Telegram and appears to have been in active development from at least April 2025.

According to a new advisory published last week by Palo Alto Networks, the stealer is written in Python and distributed as a PyInstaller package, allowing it to run on victim systems without additional dependencies.

Its code is protected using Pyarmor, a legitimate tool that can also be abused to hinder static analysis and signature-based detection.

How the Malware Operates

The analysis shows that VVS stealer is designed primarily to harvest Discord-related data, while also targeting information stored in web browsers.

Once installed, it establishes persistence by copying itself into the Windows startup folder and attempts to remain unnoticed by displaying fake error messages.

Its advertised and observed capabilities include:

  • Stealing Discord tokens and account information

  • Injecting malicious JavaScript into the Discord application to hijack active sessions

  • Extracting browser data such as cookies, passwords, history and autofill entries

Read more on Discord-focused malware threats: Discord Reveals Data Breach Following Third-Party Compromise

Obfuscation, Decryption and Exfiltration

Palo Alto Networks found that Pyarmor was used in BCC mode, converting Python functions into compiled C code stored in a separate ELF file. The protected bytecode and strings were encrypted using AES-128-CTR, with keys and nonces tied to a specific Pyarmor license.

By reversing these layers, analysts were able to reconstruct large portions of the original Python logic and observe how encrypted payloads and strings were processed.

Once Discord tokens are decrypted, the malware queries multiple Discord API endpoints to collect user details, including account settings, billing information and friends lists. This data is then exfiltrated via HTTP POST requests to Discord webhooks, a mechanism that does not require authentication.

The stealer also targets a wide range of Chromium-based and Firefox browsers, compressing stolen data into a single ZIP archive before exfiltration. The malware sample analyzed is configured to stop functioning after October 31 2026.

“VVS stealer demonstrates how tools like Pyarmor, which can be used for legitimate purposes, can also be leveraged to build stealthy malware aimed at hijacking credentials for popular platforms such as Discord,” Palo Alto Networks wrote.

“Its emergence signals a need for defenders to strengthen monitoring around credential theft and account abuse.”

Image credit: Sergei Elagin / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSilver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
Next Article CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
Team-CWD
  • Website

Related Posts

News

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

January 6, 2026
News

New Zealand Orders Review of Manage My Health Breach

January 5, 2026
News

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

January 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How cybercriminals are targeting content creators

November 26, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.