A cybercrime group of Brazilian origin has resurfaced after greater than three years to orchestrate a marketing campaign that targets Minecraft gamers with a brand new stealer known as LofyStealer (aka GrabBot).
“The malware disguises itself as a Minecraft hack called ‘Slinky,'” Brazil-based cybersecurity firm ZenoX mentioned in a technical report. “It uses the official game icon to induce voluntary execution, exploiting the trust of young users in the gaming scene.”
The exercise has been attributed with excessive confidence to a risk actor referred to as LofyGang, which was noticed leveraging typosquatted packages on the npm registry to push stealer malware in 2022, particularly with an intent to siphon bank card knowledge and person accounts related to Discord Nitro, gaming, and streaming companies.
The group, believed to be energetic since late 2021, advertises their instruments and companies on platforms like GitHub and YouTube, whereas additionally contributing to an underground hacking group beneath the alias DyPolarLofy to leak 1000’s of Disney+ and Minecraft accounts.
“Minecraft has been a LofyGang target since 2022,” Acassio Silva, co-founder and head of risk intelligence at ZenoX, informed The Hacker Information. “They leaked thousands of Minecraft accounts under the DyPolarLofy alias on Cracked.io. The current campaign goes after Minecraft players directly through a fake ‘Slinky’ hack.”
The assault begins with a Minecraft hack that, when launched, triggers the execution of a JavaScript loader that is finally accountable for the deployment of LofyStealer (“chromelevator.exe”) on compromised hosts and execute it instantly in reminiscence with an intention to reap a variety of delicate knowledge spanning a number of net browsers, together with Google Chrome, Chrome Beta, Microsoft Edge, Courageous, Opera, Opera GX, Mozilla Firefox, and Avast Browser.
The captured knowledge, which incorporates cookies, passwords, tokens, playing cards, and Worldwide Financial institution Account Numbers (IBANs), is exfiltrated to a command-and-control (C2) server positioned at 24.152.36[.]241.
“Historically, the group’s primary vector was the JavaScript supply chain: NPM package typosquatting, starjacking (fraudulent references to legitimate GitHub repositories to inflate credibility), and payloads embedded in sub-dependencies to evade detection,” ZenoX mentioned.
“The focus was on Discord token theft, Discord client modification for credit card interception, and exfiltration via webhooks abusing legitimate services (Discord, Repl.it, Glitch, GitHub, and Heroku) as C2.”
The newest growth marks a departure from beforehand noticed tradecraft and a shift in the direction of a malware-as-a-service (MaaS) mannequin with free and premium tiers, together with a bespoke builder known as Slinky Cracked that is used as a supply automobile for the stealer malware.

The disclosure comes as risk actors are more and more abusing the belief related to a platform like GitHub to host bogus repositories that act as lures for malware households like SmartLoader, StealC Stealer, and Vidar Stealer. Unsuspecting customers are directed to those repositories by strategies like web optimization poisoning.
In some circumstances, attackers have been discovered to unfold Vidar 2.0 by Reddit posts promoting faux Counter-Strike 2 sport cheats, redirecting victims to a malicious web site that delivers a ZIP archive containing the malware.
“This infostealer campaign highlights an ongoing security challenge where widely trusted platforms are abused to distribute malicious payloads,” Acronis mentioned in an evaluation revealed final month. “By taking advantage of social trust and common download channels, threat actors are often able to bypass traditional security solutions.”
The findings add to a rising checklist of campaigns which have leveraged GitHub in latest months –
- Concentrating on builders instantly inside GitHub, utilizing faux Microsoft Visible Studio Code (VS Code) safety alerts posted by Discussions to trick customers into putting in malware by clicking on a hyperlink. “Because GitHub Discussions trigger email notifications for participants and watchers, these posts are also delivered directly to developers’ inboxes,” Socket mentioned. “This extends the reach of the campaign beyond GitHub itself and makes the alerts appear more legitimate.”
- Concentrating on Argentina’s judicial methods utilizing spear‑phishing emails to distribute a compressed ZIP archive that makes use of an intermediate batch script to retrieve a distant entry trojan (RAT) hosted on GitHub.
- Creating GitHub accounts and OAuth functions, adopted by opening a difficulty that mentions a goal developer, triggering an e-mail notification that, in flip, tips them into authorizing the OAuth app, successfully permitting the attacker to acquire their entry tokens. The problems intention to induce a false sense of urgency, warning customers of bizarre entry makes an attempt.
- Utilizing fraudulent GitHub repositories to distribute malicious batch script installers masquerading as professional IT and safety software program, resulting in the deployment of the TookPS downloader, which then initiates a multi-stage an infection chain to determine persistent distant entry utilizing SSH reverse tunnels and RATs like MineBridge RAT (aka TeviRAT). The exercise has been attributed to Rift Brigantine (aka FIN11, Sleek Spider, and TA505).
- Utilizing counterfeit GitHub repositories posing as AI instruments, sport cheats, Roblox scripts, telephone quantity location trackers, and VPN crackers to distribute LuaJIT payloads that perform as a generic trojan as a part of a marketing campaign dubbed TroyDen’s Lure Manufacturing facility.
“The breadth of the lure factory – gaming cheats, developer tools, phone trackers, Roblox scripts, VPN crackers – suggests an actor optimizing for volume across audiences rather than precision targeting,” Netskope mentioned.
“Defenders should treat any GitHub-hosted download that pairs a renamed interpreter with an opaque data file as a high-priority triage candidate, regardless of how legitimate the surrounding repository looks.”



