Cyber Security News

Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign

A new variant of the Snake Keylogger, also known as 404 Keylogger, has been detected targeting users of popular web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox.

FortiGuard Labs identified this threat using FortiSandbox v5.0 (FSAv5), a cutting-edge malware detection platform powered by advanced artificial intelligence (AI) and machine learning.

This malicious software is designed to steal sensitive user information, including credentials and other personal data, by logging keystrokes and monitoring clipboard activity.

High-Impact Campaign with Global Reach

The Snake Keylogger variant, identified as AutoIt/Injector.GTY!tr, has already been linked to over 280 million blocked infection attempts worldwide.

The highest concentration of these detections has been reported in regions such as China, Turkey, Indonesia, Taiwan, and Spain.

Delivered primarily through phishing emails containing malicious attachments or links, the malware exfiltrates stolen data to its command-and-control (C2) server via SMTP or Telegram bots.

This enables attackers to gain unauthorized access to victims’ sensitive information.

Advanced Techniques for Evasion and Persistence

This variant employs sophisticated techniques to evade detection and maintain persistence on infected systems.

It utilizes AutoIt, a scripting language often used for automation in Windows environments, to compile its payload into standalone executables that bypass traditional antivirus solutions.

Upon execution, the malware drops files into specific directories such as %Local_AppData%\supergroup and creates scripts in the Windows Startup folder to ensure it runs automatically upon system reboot.

Screenshot of ageless.vbs placed in the Startup folder for persistence.

Additionally, Snake Keylogger uses process hollowing to inject malicious code into legitimate processes like RegSvcs.exe.

This technique allows the malware to operate undetected within trusted system processes.

It also targets browser autofill systems to extract stored credentials and credit card details while employing low-level keyboard hooks to capture keystrokes.

Snake Keylogger’s attempt to steal the victim’s credit card information

FortiSandbox v5.0 played a pivotal role in identifying this threat through its PAIX AI engine.

The platform combines static analysis examining code structures and embedded signatures with dynamic behavioral analysis to detect suspicious activities in real-time.

FSAv5 uncovered obfuscated strings, API calls, and runtime behaviors indicative of credential harvesting and data exfiltration.

Fortinet analysis revealed that Snake Keylogger leverages websites like checkip[.]dyndns[.]org for geolocation reconnaissance and transmits stolen data via HTTP POST requests.

It also deploys encrypted scripts and specialized modules to access browser-related login credentials.

Organizations are advised to strengthen their email security measures to prevent phishing attacks the primary delivery mechanism for Snake Keylogger.

Deploying advanced threat detection tools like FortiSandbox can help identify and mitigate such threats effectively.

Regular updates of antivirus solutions and employee training on cybersecurity best practices are also critical in reducing exposure to evolving malware campaigns.

As this attack campaign underscores the growing sophistication of keyloggers, proactive measures remain essential in safeguarding sensitive information against emerging threats.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response and Threat Hunting – Register Here

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…

9 hours ago

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…

9 hours ago

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

15 hours ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

2 days ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago