COINTURK NEWSCOINTURK NEWSCOINTURK NEWS
  • Crypto Tracker App
  • Bitcoin
  • Altcoin
  • Ethereum
  • Advertise
  • Contact
  • TURTURTUR
  • ESESES
Search
© 2024 COINTURK NEWS. All Rights Reserved.
Reading: Cybercriminals Deploy Torg Grabber Malware to Target 728 Crypto Wallet Extensions
Share
Font ResizerAa
COINTURK NEWSCOINTURK NEWS
Font ResizerAa
Search
  • Crypto Tracker App
  • Bitcoin
  • Altcoin
  • Ethereum
  • Advertise
  • Contact
  • TURTURTUR
  • ESESES
Follow US
© 2025 >> COINTURK NEWS
Powered by LK SOFTWARE
COINTURK NEWS > Blockchain News > Cybercriminals Deploy Torg Grabber Malware to Target 728 Crypto Wallet Extensions
Blockchain News

Cybercriminals Deploy Torg Grabber Malware to Target 728 Crypto Wallet Extensions

In Brief

  • Torg Grabber malware targets hundreds of crypto wallet browser extensions and related applications.

  • The malware uses sophisticated tactics to steal wallet credentials and session tokens from victims.

  • Security experts warn that hot and poorly secured wallets face the greatest risk from these attacks.

İlayda Peker
İlayda Peker 3 weeks ago
Share
SHARE

Digital assets and cryptocurrency wallets have come under renewed threat as a newly identified piece of malicious software, dubbed Torg Grabber, actively targets browser extensions linked to crypto holdings. The malware, currently operational in the wild, is capable of scanning an alarming 728 browser-based crypto wallet extensions among more than 850 targeted plugins, putting the security of countless digital wallets at immediate risk.

Contents
How Torg Grabber Infiltrates DevicesWho Faces the Greatest Risk?

How Torg Grabber Infiltrates Devices

Torg Grabber employs a multi-stage infection sequence, initially spreading via an installation package identified by the alias GAPI_Update.exe—an InnoSetup-based file weighing in at 60 MB. Leveraging Dropbox infrastructure, the malware reaches victims’ computers and, once launched, stealthily extracts three innocuous-looking DLL files into the local directory. Simultaneously, it triggers a decoy Windows Security Update screen lasting 420 seconds, during which the malware loads itself in the background, leading the user to believe a legitimate installation process is underway.

Once installation is complete, randomly named executable files are dropped into the Windows directory. Analyzed samples of the threat have attempted to interfere with Windows’ event logging systems—an evasive maneuver designed to conceal its tracks and mask its presence. Fortunately, behavioral analysis solutions have managed to foil these attempts, limiting further compromise.

The reach of Torg Grabber extends beyond just browsers. The malware targets 25 Chromium-based browsers, eight Firefox variants, as well as widely used applications like Discord, Steam, and Telegram. Password vaults, VPN clients, FTP tools, and email clients are all within its sights. Information collected is either compressed on the fly or exfiltrated in small chunks. Data theft operations are routed over Cloudflare using robust ChaCha20 encryption and HMAC-SHA256 authentication, a sign of its sophisticated infrastructure. Rather than a rudimentary hacking tool, Torg Grabber is seen as a well-structured, service-based criminal operation.

Investigators have emphasized that Torg Grabber targets 728 cryptocurrency wallets, enabling the theft of sensitive user data and driving financially motivated attacks.

Who Faces the Greatest Risk?

The highest risk group includes users who manage their crypto assets through browser-based hot wallets such as MetaMask and Phantom. Those retaining private or encryption keys on their machines stand to lose their entire balance in a single breach. Even users of physical hardware wallets can be exposed if they store their recovery phrases in any digital format on the infected device.

Cybersecurity firm Gen Digital’s thorough analysis of Torg Grabber compiled 334 distinct variants within a three-month span, concluding that the campaign is an active example of Malware-as-a-Service rather than a mere experiment. The investigation revealed nearly 40 operator tags, chronological version codes, and Telegram handles embedded in malware binaries. Evidence also points to operations involving eight separate criminal actors, many of whom have established links to the Russian cybercrime ecosystem.

At its core, the attack aims to compromise wallet files that have been downloaded or backed up locally, as well as session tokens that may allow unauthorized access. If the victim’s computer is logged into cryptocurrency exchanges, attackers can potentially exploit open sessions to access funds directly.

While Torg Grabber employs several established techniques seen in previous malware campaigns like Vidar and RedLine, attackers now benefit from a more advanced infrastructure and a continually expanding wallet extension list. The ability to simultaneously scan 728 unique wallets sets a new benchmark for targeted attacks—one that is only expected to grow as the malware evolves.

You can follow our news on Telegram, Facebook & Coinmarketcap & X
Disclaimer: The information contained in this article does not constitute investment advice. Investors should be aware that cryptocurrencies carry high volatility and therefore risk, and should conduct their own research.

You Might Also Like

TxFlow L1 mainnet launches with high-performance on-chain finance infrastructure

Aave Labs Plots Sweeping Shift To Direct Protocol Revenue To DAO Treasury

Startale Secures $63 Million as SBI and Sony Back Blockchain Tokenization in Japan

African Crypto Market Stands Out With Rapid Growth And New Regulation

US Commodity Futures Chief Champions Blockchain for Verifying AI-Generated Content

İlayda Peker 27 March, 2026 - 11:42 am 27 March, 2026 - 11:42 am
Share This Article
Facebook Twitter
Share
İlayda Peker
By İlayda Peker
Follow:
Uluslararası İlişkiler ve Siyaset Bilimi Mezunu, Kitap sever.
Previous Article Tether’s Independent Audit Signals New Era Of Stablecoin Scrutiny
Next Article Bitcoin, Stocks, And Oil Shift As White House Delays Iran Strike Decision
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

8.1k Like
21.1k Follow
1.1k Follow

Latest News

Ethereum matches $2,350 price from April 2021 after five years
Ethereum (ETH)
Solana eyes $87 with price battling $84 resistance
Solana (SOL)
Whales bought 270,000 BTC as supply hit 7-year low
Bitcoin (BTC)
//

COINTURK was launched in March 2014 by a group of technology enthusiasts who believe that Bitcoin will be as important as the internet in the world of the future thanks to the amazing technology underlying it.

CRYPTOCURRENCY LIVE PRICES

  • Bitcoin (BTC) Live Price
  • Ethereum (ETH) Live Price
  • Ripple (XRP) Live Price
  • Solana (SOL) Live Price
  • Dogecoin (DOGE) Live Price
  • Cardano (ADA) Live Price
  • Chainlink (LINK) Live Price

OUR PARTNERS

  • COINMARKETCAP
  • COINGECKO
  • BITCOINHABER
  • BH NEWS
  • 21MILYON
  • NEWSLINKER

OUR COMPANY

  • About Us
  • Cookie Policy
  • Advertising
  • Contact
COINTURK NEWSCOINTURK NEWS
Follow US
COINTURK NEWS
Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Lost your password?