{"id":743,"date":"2026-04-28T18:00:56","date_gmt":"2026-04-28T18:00:56","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=743"},"modified":"2026-04-28T18:00:56","modified_gmt":"2026-04-28T18:00:56","slug":"brazilian-lofygang-resurfaces-after-three-years-with-minecraft-lofystealer-campaign","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=743","title":{"rendered":"Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQf8Wzg1Ms0KVsO546uQuwlR3w_8qW1MQZExs5TgKCGHSNNS1UEnOITq-_y8HIrA_3n_gfq7Hm0IMb-XSRJSsGL1ncRPlPoyDX7cf_wFbEGAJCPkv6ZDBzjN1Nswe9-CMR3Tmn1F5KuVyWGdOkGEIbeI9R7zGKplJPofRFBx-Ru20JOGfAFEpiZOAlDBXh\/s1700-e365\/hackers.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called <strong>LofyStealer<\/strong> (aka GrabBot).<\/p>\n<p>\u00abThe malware disguises itself as a Minecraft hack called &#8216;Slinky,'\u00bb Brazil-based cybersecurity company ZenoX <a href=\"https:\/\/zenox.ai\/en\/lofystealer-malware-mirando-jogadores-de-minecraft\/\">said<\/a> in a technical report. \u00abIt uses the official game icon to induce voluntary execution, exploiting the trust of young users in the gaming scene.\u00bb<\/p>\n<p>The activity has been attributed with high confidence to a threat actor known as LofyGang, which was observed leveraging typosquatted packages on the npm registry to push stealer malware in 2022, specifically with an intent to siphon credit card data and user accounts associated with Discord Nitro, gaming, and streaming services.<\/p>\n<p>The group, believed to be active since late 2021, advertises their tools and services on platforms like GitHub and YouTube, while also contributing to an underground hacking community under the alias DyPolarLofy to leak thousands of Disney+ and\u00a0 Minecraft accounts.<\/p>\n<p>\u00abMinecraft has been a LofyGang target since 2022,\u00bb Acassio Silva, co-founder and head of threat intelligence at ZenoX, told The Hacker News. \u00abThey leaked thousands of Minecraft accounts under the DyPolarLofy alias on Cracked.io. The current campaign goes after Minecraft players directly through a fake &#8216;Slinky&#8217; hack.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-blindspot-d-2\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXdwBgwvGAvD2t1bXXwTy6zsfnReMp12VglYCBAv0j9Tc0_gLKPqF5HJO1kOv26ZcGRlQJ1kRXGvtIusmtnUGUjonzq8YEigkMhMJvk_Cta9TYHzMvqVfa5SvoH-Z9-kw5VEH8sPeI1YKKrzFeNYp0Cn7mEGMn6PXOs0waZDIWKI5nccOxPyJR8MDQMasu\/s728-e100\/nudge-d-2.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The attack begins with a Minecraft hack that, when launched, triggers the execution of a JavaScript loader that&#8217;s ultimately responsible for the deployment of LofyStealer (\u00abchromelevator.exe\u00bb) on compromised hosts and execute it directly in memory with an aim to harvest a wide range of sensitive data spanning multiple web browsers, including Google Chrome, Chrome Beta, Microsoft Edge, Brave, Opera, Opera GX, Mozilla Firefox, and Avast Browser.<\/p>\n<p>The captured data, which includes cookies, passwords, tokens, cards, and International Bank Account Numbers (IBANs), is exfiltrated to a command-and-control (C2) server located at 24.152.36[.]241.<\/p>\n<p>\u00abHistorically, the group&#8217;s primary vector was the JavaScript supply chain: NPM package typosquatting, starjacking (fraudulent references to legitimate GitHub repositories to inflate credibility), and payloads embedded in sub-dependencies to evade detection,\u00bb ZenoX said.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>\u00abThe focus was on Discord token theft, Discord client modification for credit card interception, and exfiltration via webhooks abusing legitimate services (Discord, Repl.it, Glitch, GitHub, and Heroku) as C2.\u00bb<\/p>\n<p>The latest development marks a departure from previously observed tradecraft and a shift towards a malware-as-a-service (MaaS) model with free and premium tiers, along with a bespoke builder called Slinky Cracked that&#8217;s used as a delivery vehicle for the stealer malware.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbAr1NKRR65f1kQCoig_Pv6wnWUX6226X-sXLNLhJf6IAtYg5lzVYkN9ghMzcI_lO9q0G8uGKVYNIVI1TWRk0B_6TNCAyzKuSDkM52lFRwg7TLA2fB6J4hX0mAIgEhJrbEZhk1Ifkl2tmTnUKPinoz_2eV934v7Vct_xc9cXlXLEn73tQZrcoqqqdGWmDk\/s1700-e365\/cc.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhbAr1NKRR65f1kQCoig_Pv6wnWUX6226X-sXLNLhJf6IAtYg5lzVYkN9ghMzcI_lO9q0G8uGKVYNIVI1TWRk0B_6TNCAyzKuSDkM52lFRwg7TLA2fB6J4hX0mAIgEhJrbEZhk1Ifkl2tmTnUKPinoz_2eV934v7Vct_xc9cXlXLEn73tQZrcoqqqdGWmDk\/s1700-e365\/cc.jpg\" alt=\"\" border=\"0\" data-original-height=\"800\" data-original-width=\"800\"\/><\/a><\/div>\n<p>The disclosure comes as threat actors are increasingly abusing the trust associated with a platform like GitHub to <a href=\"https:\/\/hexastrike.com\/resources\/blog\/threat-intelligence\/cloned-loaded-and-stolen-how-109-fake-github-repositories-delivered-smartloader-and-stealc\/\">host bogus repositories<\/a> that act as lures for <a href=\"https:\/\/blog.intellibron.io\/lua-jit-smartloader-analyzing-the-github-campaign-delivering-stealer\/\">malware families<\/a> like SmartLoader, StealC Stealer, and Vidar Stealer. Unsuspecting users are directed to these repositories through techniques like SEO poisoning.<\/p>\n<p>In some cases, attackers have been found to spread Vidar 2.0 through Reddit posts advertising fake Counter-Strike 2 game cheats, redirecting victims to a malicious website that delivers a ZIP archive containing the malware.<\/p>\n<p>\u00abThis infostealer campaign highlights an ongoing security challenge where widely trusted platforms are abused to distribute malicious payloads,\u00bb Acronis <a href=\"https:\/\/www.acronis.com\/en\/tru\/posts\/vidar-stealer-20-distributed-via-fake-game-cheats-on-github-and-reddit\/\">said<\/a> in an analysis published last month. \u00abBy taking advantage of social trust and common download channels, threat actors are often able to bypass traditional security solutions.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The findings add to a growing list of campaigns that have leveraged GitHub in recent months &#8211;<\/p>\n<ul>\n<li>Targeting developers directly inside GitHub, using fake Microsoft Visual Studio Code (VS Code) security alerts posted through Discussions to trick users into installing malware by clicking on a link. \u00abBecause GitHub Discussions trigger email notifications for participants and watchers, these posts are also delivered directly to developers&#8217; inboxes,\u00bb Socket <a href=\"https:\/\/socket.dev\/blog\/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-malware\">said<\/a>. \u00abThis extends the reach of the campaign beyond GitHub itself and makes the alerts appear more legitimate.\u00bb<\/li>\n<li>Targeting Argentina&#8217;s judicial systems <a href=\"https:\/\/www.pointwild.com\/threat-intelligence\/covert-rat-phishing-campaign\/\">using spear\u2011phishing emails<\/a> to distribute a compressed ZIP archive that uses an intermediate batch script to retrieve a remote access trojan (RAT) hosted on GitHub.<\/li>\n<li>Creating <a href=\"https:\/\/blog.atsika.ninja\/posts\/the-phishy-github-issue-case\/\">GitHub accounts and OAuth applications<\/a>, followed by opening an issue that mentions a target developer, triggering an email notification that, in turn, tricks them into authorizing the OAuth app, effectively allowing the attacker to obtain their access tokens. The issues aim to induce a false sense of urgency, warning users of unusual access attempts.<\/li>\n<li>Using fraudulent GitHub repositories to distribute malicious batch script installers masquerading as legitimate IT and security software, leading to the deployment of the TookPS downloader, which then initiates a multi-stage infection chain to establish persistent remote access using SSH reverse tunnels and RATs like MineBridge RAT (aka TeviRAT). The activity has been attributed to <a href=\"https:\/\/www.bluevoyant.com\/blog\/rift-brigantines-github-lures-deploy-malware\">Rift Brigantine<\/a> (aka FIN11, Graceful Spider, and TA505).<\/li>\n<li>Using counterfeit GitHub repositories posing as AI tools, game cheats, Roblox scripts, phone number location trackers, and VPN crackers to distribute <a href=\"https:\/\/www.netskope.com\/blog\/openclaw-trap-ai-assisted-lure-factory-targets-developers-gamers\">LuaJIT payloads<\/a> that function as a generic trojan as part of a campaign dubbed TroyDen&#8217;s Lure Factory.<\/li>\n<\/ul>\n<p>\u00abThe breadth of the lure factory \u2013 gaming cheats, developer tools, phone trackers, Roblox scripts, VPN crackers \u2013 suggests an actor optimizing for volume across audiences rather than precision targeting,\u00bb Netskope said.<\/p>\n<p>\u00abDefenders should treat any GitHub-hosted download that pairs a renamed interpreter with an opaque data file as a high-priority triage candidate, regardless of how legitimate the surrounding repository looks.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). \u00abThe&hellip;<\/p>\n","protected":false},"author":1,"featured_media":744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[640,6,1455,1458,1457,1456,246],"class_list":["post-743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-brazilian","tag-campaign","tag-lofygang","tag-lofystealer","tag-minecraft","tag-resurfaces","tag-years"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=743"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/743\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/744"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}