Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Vietnamese Hackers Target Global Victims Using PaxStealer Malware
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Vietnamese Hackers Target Global Victims Using PaxStealer Malware

Highlights

  • Vietnamese-speaking hackers targeted thousands across over 62 countries using PaxStealer malware.

  • Victims lost passwords, card data, and cookies, sold via subscription networks on Telegram.

  • PaxStealer attacks demonstrate evolving tactics and broader global victim targeting strategies.

Kaan Demirel
Last updated: 4 August, 2025 - 10:19 pm 10:19 pm
Kaan Demirel 5 hours ago
Share
SHARE

A recent cyberattack campaign linked to Vietnamese-speaking hackers has expanded its reach across 62 countries, according to new research. Investigators from SentinelLABS of SentinelOne and Beazley Security have identified a surge in highly evasive information-stealing activities, affecting thousands of personal and corporate users. The attacks employ advanced techniques to bypass standard security defenses and harvest sensitive data. The incident highlights both the scale and adaptability of these threat actors, presenting new challenges for cybersecurity teams worldwide.

Contents
How Have the Attackers Increased Their Effectiveness?What Type of Data Has Been Compromised?How Are Stolen Credentials Monetized?

When comparing recent findings to earlier reports such as those by Cisco Talos, the current wave demonstrates more sophisticated tradecraft and wider victim targeting. While previous incidents linked Vietnamese-speaking hackers mainly to attacks on governmental and educational institutions, the present campaign shows indiscriminate targeting that encompasses private individuals and businesses internationally. The utilization of platforms like Telegram for automating the resale and use of stolen credentials indicates an evolution from earlier, less organized operations.

How Have the Attackers Increased Their Effectiveness?

The hackers have incorporated novel anti-detection methods that help their campaigns evade antivirus and security operations monitoring. Recent activities include developing tailored approaches that confuse analysts and make detection more difficult. SentinelLABS and Beazley Security observed the attackers adapting their methods and refining deployment chains to maximize effectiveness and minimize risk of exposure, resulting in widespread credential theft.

What Type of Data Has Been Compromised?

Analysis of the breaches revealed the theft of over 200,000 unique passwords, numerous credit card records, and more than four million browser cookies. This extensive dataset offers cybercriminals access to both personal accounts and sensitive financial information across a wide range of victims. One statement clarified,

“The stolen data includes over 200,000 unique passwords, hundreds of credit card records, and more than 4 million harvested browser cookies, giving actors ample access to victims’ accounts and financial lives.”

How Are Stolen Credentials Monetized?

Stolen credentials and data are monetized via subscription-based ecosystems run through the Telegram messaging platform. These platforms allow other cybercriminals to purchase access for cryptocurrency theft or further attacks. SentinelLABS noted,

“The evolving tradecraft in these recent campaigns demonstrates that these adversaries have meticulously refined their deployment chains, making them increasingly more challenging to detect and analyze.”

The growing prevalence and sophistication of infostealers like PaxStealer underscore the need for proactive, multi-layered defenses among individuals and organizations alike. Threat actors continue to exploit automation channels and anonymized platforms, facilitating the mass distribution and resale of sensitive data. Regularly updating security tools, monitoring for suspicious activity, and educating users on cyber risks remain crucial tactics against these attacks. The report illustrates a shift from targeted assaults to broader, more opportunistic campaigns, signifying persistent risk to global digital assets in both public and private sectors.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Google Issues August Patch to Fix Six Android Flaws

Global Authorities Seize BlackSuit Ransomware Infrastructure

CrowdStrike Identifies Surge in North Korean IT Infiltration

Senate Confirms Cairncross as National Cyber Director After Delay

Researchers Warn Users Fix Cursor Software to Block Remote Attacks

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Apple Ends Support for Apple Watch Series 1 Repairs
Next Article Unitree Lowers Price with New R1 Humanoid Robot Debut

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Doubles Austin Robotaxi Area, Sends Bold Signal to Rivals
Electric Vehicle
Unitree Lowers Price with New R1 Humanoid Robot Debut
AI Robotics
Apple Ends Support for Apple Watch Series 1 Repairs
Wearables
Tesla Grants Restricted Stock Package to Retain Elon Musk
Electric Vehicle
Tencent Releases Hunyuan AI Models to Broaden Open-Source Offerings
AI
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?