Skip to content

Malicious Python-Powered XillenStealer Targeting Windows Users for Data Theft

Python-based information stealer named XillenStealer, found on GitHub, comes equipped with a Telegram GUI builder and is capable of pilfering browser data and digital wallets. The tool has swiftly gained favor among cybercriminals.

Windows users targeted by Python-based malware called XillenStealer, aiming to swipe sensitive...
Windows users targeted by Python-based malware called XillenStealer, aiming to swipe sensitive data.

Malicious Python-Powered XillenStealer Targeting Windows Users for Data Theft

In the ever-evolving landscape of cybercrime, a new player has surfaced - the XillenStealer malware. First reported in mid-September 2025, this Python-based information stealer has made its home on GitHub, making it accessible to various cybercriminals without a single known author.

Originating as an open-source tool, XillenStealer has quickly become a commodity in underground markets, indicative of the ongoing professionalization of cybercrime. The malware's modular architecture allows operators to toggle specific data harvesting capabilities, making it a versatile tool for a wide range of threats.

Upon initial execution, XillenStealer ensures survival across reboots with a persistence mechanism. This mechanism causes the stealer to automatically execute at every user logon, maintaining its long-term presence on compromised systems.

The builder interface of XillenStealer is protected by a SHA-256 password hash, adding an extra layer of security for its operators. The malware integrates native Windows APIs and Python libraries like win32api, requests, and PyAutoGUI, allowing it to blend seamlessly into the Windows environment.

XillenStealer's infection mechanism relies on a builder and persistence setup. It can be delivered as a PyInstaller-packaged executable or run directly with Python. Upon execution, the stealer performs extensive reconnaissance to fingerprint the environment, preparing for its data collection routines.

These routines include locating and exfiltrating cryptocurrency wallet files, decrypting stored credentials from Chromium-based browsers, and targeting browsers, cryptocurrency wallets, gaming applications, and messaging platforms. The data collected is consolidated into reports, which are then segmented and uploaded to the attacker's Telegram chat.

To thwart analysis in detected sandbox environments, XillenStealer uses the Windows API. Operators compile malicious payloads into standalone executables using PyInstaller and UPX compression, further masking their malicious intentions. The stealer even masquerades as a benign maintenance task to reinforce its stealth.

As XillenStealer continues to siphon valuable data, it underscores the importance of robust cybersecurity measures. Checks such as examining MAC address prefixes and known process names can help in identifying and mitigating potential threats. Stay vigilant, and protect your digital assets.

Read also:

Latest

Investigation

Investigation

Golf R undergoes testing in China, set to debut at the Shanghai Auto Show in April, with a swift entry into the market following the event.