Cybercriminals Target Financial Institutions with PXA Stealer via Phishing ZIP Files

Cybercriminals Exploit Phishing ZIP Files to Deploy PXA Stealer in Financial Sector

In a concerning development, cybercriminals have intensified their attacks on financial institutions by deploying PXA Stealer, a sophisticated information-stealing malware. This surge follows the dismantling of major infostealer operations like Lumma, Rhadamanthys, and RedLine throughout 2025, creating a void that PXA Stealer has rapidly filled. Researchers estimate an 8 to 10 percent increase in PXA Stealer activity during the first quarter of 2026.

Phishing Tactics and Delivery Methods

The attackers employ phishing emails embedded with malicious URLs, leading recipients to download ZIP files containing concealed malware. These emails utilize a diverse array of decoy documents, including counterfeit resumes, Adobe Photoshop installers, tax forms, and legal paperwork. This variety enables the malware to target employees across various departments within financial organizations, complicating detection and defense efforts.

Campaign Analysis and Targeting

CyberProof analysts have identified a campaign cluster associated with a bot identifier labeled Verymuchxbot, distinct from previously reported PXA Stealer activities. Their investigation traced the entire attack chain—from the initial phishing email to the final data exfiltration—revealing a deliberate focus on global financial institutions.

Malware Functionality and Persistence

PXA Stealer is designed to covertly collect browser credentials, saved passwords, and cryptocurrency wallet data from infected systems. The harvested information is transmitted to attackers via Telegram channels, facilitating discreet data exfiltration. To maintain persistence, the malware creates registry entries ensuring it remains active even after system reboots, granting attackers prolonged access to compromised machines.

Evasion Techniques

A notable aspect of this campaign is its ability to blend seamlessly into normal system operations. Attackers utilize legitimate Windows tools and rename files to mimic trusted process names, significantly reducing the likelihood of detection. This strategic use of native tools and deceptive naming conventions underscores the sophistication of the attack.

Detailed Infection Chain

The attack initiates when a victim downloads a ZIP archive named Pumaproject.zip from the domain `downloadtheproject[.]xyz`. This archive contains a file titled Document.docx.exe, crafted to appear as a harmless Word document. Upon execution, the malware extracts a Python interpreter, various Python libraries, and malicious scripts, creating a hidden folder named Dots to store these components.

Within the Dots folder, the attackers place a legitimate WinRar binary renamed as picture.png and an encrypted archive disguised as Shodan.pdf. The Windows utility certutil decodes this file, after which the WinRar binary unpacks the archive using the password shodan2201. The extracted contents are deposited in `C:\Users\Public\WindowsSecure`, and the Python interpreter is renamed to svchost.exe to masquerade as a trusted Windows process.

A heavily obfuscated Python script, disguised as images.png, is then executed, initiating the malware’s data collection and exfiltration processes.

Implications for Financial Institutions

The resurgence of PXA Stealer poses a significant threat to financial institutions worldwide. The malware’s ability to discreetly harvest sensitive information and maintain persistent access to compromised systems underscores the need for heightened vigilance and robust cybersecurity measures within the financial sector.

Recommendations for Mitigation

To defend against such sophisticated attacks, financial organizations should consider implementing the following measures:

1. Employee Training: Conduct regular cybersecurity awareness programs to educate staff on recognizing phishing attempts and the dangers of downloading files from unverified sources.

2. Email Filtering: Deploy advanced email filtering solutions capable of detecting and blocking phishing emails containing malicious links or attachments.

3. Endpoint Protection: Utilize comprehensive endpoint detection and response (EDR) systems to monitor and respond to suspicious activities on all devices connected to the network.

4. Regular Updates: Ensure all software, including operating systems and applications, are up-to-date with the latest security patches to mitigate vulnerabilities.

5. Network Segmentation: Implement network segmentation to limit the spread of malware within the organization, reducing potential damage from an infection.

6. Incident Response Plan: Develop and regularly update an incident response plan to swiftly address and mitigate the impact of security breaches.

Conclusion

The deployment of PXA Stealer through phishing ZIP files represents a sophisticated and evolving threat to financial institutions. By understanding the tactics employed by cybercriminals and implementing comprehensive security measures, organizations can enhance their defenses against such malicious campaigns.