Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Cardano’s Hoskinson says Bitcoin’s quantum fix can’t save Satoshi Nakamoto’s BTC

April 17, 2026

This Week in Crypto Law (Apr. 5, 2026)

April 17, 2026

Rackspace Technology to Announce First Quarter 2026 Earnings on May 7, 2026

April 17, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Byakugan Infostealer Capabilities Revealed – Infosecurity Magazine
Byakugan Infostealer Capabilities Revealed - Infosecurity Magazine
Security and Privacy

Byakugan Infostealer Capabilities Revealed – Infosecurity Magazine

April 8, 2024No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

New research has shed light on the intricate workings of the Byakugan malware, initially detected in January.

During an investigation into a campaign featuring malware concealed within PDFs, the FortiGuard Labs team unearthed additional insights about the malware. Last Thursday, they issued an advisory spotlighting Byakugan’s infostealer capabilities.

According to the technical write-up, Byakugan’s modus operandi shares similarities with previously discovered malware, including the use of deceptive tactics to lure victims. By disguising itself as an Adobe Reader installer in a Portuguese PDF, users are prompted to download and execute the malware.

The PDF prompts victims to click a concealed link, triggering a chain of events leading to the download of a downloader. This downloader, named “require.exe,” alongside a benign installer, is deposited into the system’s temp folder. Subsequently, a DLL is downloaded, executed via DLL-hijacking to fetch the main module, “chrome.exe.”

Byakugan’s main module, in particular, is retrieved from a designated command-and-control (C2) server, potentially serving as the attacker’s control panel. Its functionalities, as gleaned from source code descriptions, are diverse. Byakugan, packed using node.js and pkg, incorporates several libraries catering to various tasks.

These functions include screen monitoring, screen capturing, cryptocurrency mining, keylogging, file manipulation and browser information theft. Notably, Byakugan can adapt its mining activities based on system usage, avoiding performance impact during high-demand tasks.

To sustain its operation, Byakugan employs anti-analysis measures and ensures persistence by configuring the task scheduler to execute upon system startup. This dual approach of incorporating both benign and malicious components complicates the analysis, making accurate detection challenging.

“There is a growing trend to use both clean and malicious components in malware, and Byakugan is no exception,” reads the advisory.

See also  US Moves to Forfeit 280 Crypto Accounts

“This approach increases the amount of noise generated during analysis, making accurate detections more difficult. However, the downloaded files provided critical details about how Byakugan works, which helped us analyze the malicious modules.”

Read more on similar malware: Infostealer Lumma Evolves With New Anti-Sandbox Method

Source link

Byakugan Capabilities Infosecurity Infostealer Magazine Revealed
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

Kraken is actively being extorted by criminals threatening to release the top crypto exchange’s internal data

April 14, 2026

Operation Atlantic Seizes $12m in Crypto Losses

April 13, 2026

Bitcoin Depot Reports $3.6m Crypto Theft After System Breach

April 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Argo Blockchain appoints former CBOE Digital head Thomas Chippas as CEO

November 27, 2023

DoJ Will Drop Some SBF Charges if They Violate Bahamas Extradition Deal

June 1, 2023

Optimism begins trials for fault proofs on Sepolia testnet

March 22, 2024

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Cardano’s Hoskinson says Bitcoin’s quantum fix can’t save Satoshi Nakamoto’s BTC

April 17, 2026

This Week in Crypto Law (Apr. 5, 2026)

April 17, 2026

Rackspace Technology to Announce First Quarter 2026 Earnings on May 7, 2026

April 17, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$74,818.00-0.41%
  • ethereumEthereum(ETH)$2,332.36-1.29%
  • tetherTether(USDT)$1.000.00%
  • rippleXRP(XRP)$1.431.46%
  • binancecoinBNB(BNB)$629.820.79%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$88.163.13%
  • tronTRON(TRX)$0.3255940.12%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.030.49%
  • dogecoinDogecoin(DOGE)$0.0975860.17%