Skip to content
MagnaNet Network MagnaNet Network

  • Home
  • About Us
    • About Us
    • Advertising Policy
    • Cookie Policy
    • Affiliate Disclosure
    • Disclaimer
    • DMCA
    • Terms of Service
    • Privacy Policy
  • Contact Us
  • FAQ
  • Sitemap
MagnaNet Network
MagnaNet Network

Brazilian Cybercrime Group LofyGang Resurfaces with New LofyStealer Campaign Targeting Millions of Minecraft Players

Cahyo Dewo, April 28, 2026

A sophisticated cybercrime syndicate of Brazilian origin, known as LofyGang, has re-emerged after a period of relative dormancy, launching an extensive campaign that specifically targets the vast global community of Minecraft players. This latest offensive leverages a newly developed information stealer, dubbed LofyStealer, also identified as GrabBot, to illicitly harvest a broad spectrum of sensitive personal and financial data. The resurgence of LofyGang signals an evolving threat landscape, particularly for online gaming communities, which increasingly find themselves in the crosshairs of financially motivated cybercriminals.

The current attack vector hinges on deception, as the malicious software is cleverly disguised as a legitimate Minecraft "hack" or cheat tool, specifically named "Slinky." According to a detailed technical report released by Brazil-based cybersecurity firm ZenoX, the malware employs the official Minecraft game icon, exploiting the inherent trust and often less critical vigilance of younger users within the gaming ecosystem. "It uses the official game icon to induce voluntary execution, exploiting the trust of young users in the gaming scene," stated the ZenoX report, highlighting the social engineering tactics at play.

This sophisticated activity has been attributed with high confidence to LofyGang, a threat actor with a documented history dating back to at least late 2021. The group gained notoriety in 2022 for orchestrating campaigns that exploited typosquatted packages on the npm registry – a package manager for JavaScript – to distribute various stealer malware. Their previous modus operandi specifically focused on siphoning credit card data and compromising user accounts associated with popular platforms such as Discord Nitro, as well as a range of gaming and streaming services. The continuity of their targets, particularly within the gaming sector, underscores a persistent strategy to capitalize on the digital assets of online enthusiasts.

LofyGang’s operational footprint extends beyond direct malware distribution. The group has historically advertised its malicious tools and services across various online platforms, including developer-centric sites like GitHub and video-sharing giants like YouTube. Furthermore, they actively contribute to an underground hacking community under the alias "DyPolarLofy," where they have been known to leak thousands of compromised accounts, including those for Disney+ and, significantly, Minecraft. This dual approach of direct attack and leveraging underground markets demonstrates a comprehensive strategy for monetization of stolen data.

A History of Targeting Gaming Communities

The targeting of Minecraft players is not a new venture for LofyGang. Acassio Silva, co-founder and head of threat intelligence at ZenoX, elaborated on this history in an interview with The Hacker News. "Minecraft has been a LofyGang target since 2022," Silva noted. "They leaked thousands of Minecraft accounts under the DyPolarLofy alias on Cracked.io. The current campaign goes after Minecraft players directly through a fake ‘Slinky’ hack." This indicates an evolution in their attack methodology, moving from merely leaking previously compromised accounts to actively engaging in direct campaigns aimed at new victims.

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

Minecraft, with its immense global player base exceeding 170 million monthly active users, presents an exceptionally attractive target for cybercriminals. Its demographic, often including younger users who may be less cybersecurity-aware, coupled with the digital assets tied to accounts (skins, servers, in-game purchases), makes it a fertile ground for credential theft and subsequent financial exploitation. The game’s popularity also means that "hacks" or "cheats" are frequently sought after, creating a ripe environment for malware disguised as desirable tools.

Anatomy of the LofyStealer Attack

The current attack chain initiated by LofyGang is meticulously crafted. It begins when an unsuspecting Minecraft player downloads and executes the deceptive "Slinky" hack. Upon launch, this seemingly innocuous file triggers the execution of a JavaScript loader. This loader acts as the initial stage of the compromise, ultimately responsible for the deployment of LofyStealer, identified by the executable name "chromelevator.exe," onto the victim’s compromised host. A critical aspect of this deployment is that the stealer is executed directly in memory, a tactic designed to evade traditional file-based antivirus detections and complicate forensic analysis.

Once active, LofyStealer embarks on an aggressive harvesting mission, designed to extract a wide array of sensitive data from multiple web browsers. The malware exhibits broad compatibility, targeting popular browsers such as Google Chrome, Chrome Beta, Microsoft Edge, Brave, Opera, Opera GX, Mozilla Firefox, and even specialized browsers like Avast Browser. The breadth of data sought is alarming, encompassing cookies, stored passwords, authentication tokens, credit card details, and even International Bank Account Numbers (IBANs). This comprehensive data collection provides the attackers with ample opportunities for identity theft, financial fraud, and further account compromises.

The exfiltration of this stolen data is directed to a command-and-control (C2) server, which ZenoX has identified at the IP address 24.152.36[.]241. This C2 infrastructure serves as the central hub for the cybercriminals to collect and manage the vast amounts of sensitive information acquired from their victims.

Evolution of LofyGang’s Tradecraft: From Supply Chain to MaaS

Historically, LofyGang’s primary attack vector revolved around exploiting the JavaScript supply chain. This involved sophisticated techniques such as npm package typosquatting, where attackers create malicious packages with names similar to popular legitimate ones, tricking developers into downloading them. Another tactic, "starjacking," involved fraudulently referencing legitimate GitHub repositories to inflate the credibility of their malicious projects. They also embedded malicious payloads within sub-dependencies of seemingly benign code, a method designed to evade detection by security scans.

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

Their previous focus was predominantly on Discord token theft and the modification of Discord client applications to intercept credit card data. The exfiltration of this data frequently leveraged legitimate services like Discord webhooks, Repl.it, Glitch, GitHub, and Heroku, abusing these platforms as their C2 infrastructure to blend malicious traffic with normal network activity.

The latest campaign, however, signifies a notable departure from these previously observed tradecrafts. It marks a significant shift towards a Malware-as-a-Service (MaaS) model. This evolution allows LofyGang to offer LofyStealer in both free and premium tiers, making their malicious tools accessible to a broader range of less technically proficient cybercriminals. Central to this MaaS offering is a bespoke builder application named "Slinky Cracked," which acts as the primary delivery vehicle for the stealer malware. This modular approach lowers the barrier to entry for aspiring cybercriminals, amplifying the potential reach and impact of LofyStealer.

The adoption of a MaaS model by LofyGang reflects a broader trend within the cybercrime ecosystem. MaaS platforms streamline the distribution and deployment of malware, allowing threat actors to focus on marketing and victim acquisition rather than complex development. This commercialization of cyber tools has fueled a rapid increase in the volume and sophistication of attacks, posing significant challenges for cybersecurity defenders.

The Broader Context: Abuse of Trusted Platforms

This disclosure by ZenoX comes amid a growing wave of campaigns where threat actors are increasingly abusing the trust associated with widely used and reputable platforms like GitHub. These platforms, intended for collaborative development and legitimate open-source projects, are being weaponized to host bogus repositories that act as lures for various malware families.

Recent analyses by cybersecurity firms like HexaStrike and Intellibron have highlighted how hundreds of fake GitHub repositories have been used to deliver sophisticated malware such as SmartLoader, StealC Stealer, and Vidar Stealer. Unsuspecting users are often directed to these malicious repositories through various social engineering techniques, including SEO poisoning, where attackers manipulate search engine results to promote their malicious links.

Beyond GitHub, attackers are also leveraging other social platforms. For instance, Vidar 2.0 has been observed spreading through Reddit posts that deceptively advertise fake Counter-Strike 2 game cheats. These posts redirect victims to malicious websites that, in turn, deliver ZIP archives containing the infostealer.

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

Acronis, in an analysis published last month, underscored the severity of this trend: "This infostealer campaign highlights an ongoing security challenge where widely trusted platforms are abused to distribute malicious payloads. By taking advantage of social trust and common download channels, threat actors are often able to bypass traditional security solutions." This reliance on social trust is a potent weapon for attackers, as users are generally less suspicious of files downloaded from what appear to be legitimate sources.

The findings related to LofyGang add to a rapidly expanding list of campaigns that have exploited GitHub in recent months. These include, but are not limited to, the distribution of various infostealers and remote access Trojans (RATs) through seemingly legitimate code repositories. The versatility of lures used in these campaigns is particularly striking. According to Netskope, the "breadth of the lure factory – gaming cheats, developer tools, phone trackers, Roblox scripts, VPN crackers – suggests an actor optimizing for volume across audiences rather than precision targeting." This indicates a strategy to cast a wide net, increasing the probability of ensnaring a diverse range of victims.

Mitigation and Recommendations

In light of these evolving threats, cybersecurity experts offer crucial advice for both individuals and organizations. Netskope specifically recommends that "Defenders should treat any GitHub-hosted download that pairs a renamed interpreter with an opaque data file as a high-priority triage candidate, regardless of how legitimate the surrounding repository looks." This technical recommendation emphasizes vigilance against suspicious file combinations often used in these attacks.

For the general user, especially within the gaming community, the following preventative measures are paramount:

  • Source Verification: Always download software, especially game cheats or modifications, only from official and highly reputable sources. Be extremely wary of unofficial websites, forums, or direct links shared on social media platforms.
  • Antivirus and Anti-Malware Software: Maintain up-to-date antivirus and anti-malware solutions and conduct regular scans of your system.
  • Strong, Unique Passwords and Two-Factor Authentication (2FA): Implement strong, unique passwords for all online accounts, particularly gaming, email, and financial services. Enable 2FA wherever possible, as it adds a critical layer of security against credential theft.
  • Browser Security: Be cautious about granting permissions to browser extensions and regularly review saved passwords and payment information within browsers. Consider using a dedicated password manager.
  • Operating System and Software Updates: Keep your operating system, web browsers, and all installed software updated to patch known vulnerabilities that attackers could exploit.
  • Educate Younger Users: Parents and guardians should educate younger gamers about the risks of downloading unofficial software and the importance of cybersecurity hygiene.

The resurgence of LofyGang with LofyStealer underscores the relentless and adaptive nature of cybercrime. As threat actors continue to innovate their tactics, moving towards MaaS models and exploiting trusted platforms, a proactive and vigilant approach to cybersecurity remains the most effective defense against these pervasive threats. The digital gaming world, while offering immense entertainment and social connection, also presents a unique battleground in the ongoing war against cybercrime.

Cybersecurity & Digital Privacy braziliancampaignCybercrimegroupHackinglofyganglofystealermillionsminecraftplayersPrivacyresurfacesSecuritytargeting

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

The Evolving Landscape of Telecommunications in Laos: A Comprehensive Analysis of Market Dynamics, Infrastructure Growth, and Future ProspectsThe Internet of Things Podcast Concludes After Eight Years, Charting a Course for the Future of Smart HomesTelesat Delays Lightspeed LEO Service Entry to 2028 While Expanding Military Spectrum Capabilities and Reporting 2025 Fiscal PerformanceOxide induced degradation in MoS2 field-effect transistors
Z-Wave Gets a Significant Boost with the Emergence of a New Chip Provider, Trident IoTDesigning, Implementing, and Evaluating Robust Memory Systems for Reliable and Personalized Agentic AI ApplicationsSamsung Galaxy A56 5G Sees Significant Price Drop Following Successor Announcement, Positioned as a Durable Mid-Range PowerhouseBeyond Vector Search: Building a Deterministic 3-Tiered Graph-RAG System
Highly energy-efficient manifold microchannel for cooling electronics with a coefficient of performance over 100,000.AWS Amplifies Global AI Education and Community Engagement with 2026 Scholars Program Launch and Summit Season Kick-offGoogle Gemini Introduces Seamless Migration Tools, Allowing Users to Transfer AI Memory and Chat Histories for Enhanced PersonalizationStrands Agents: Architecting Efficient AI with Intent-Based Tooling and Narrowly Scoped Agents

Categories

  • AI & Machine Learning
  • Blockchain & Web3
  • Cloud Computing & Edge Tech
  • Cybersecurity & Digital Privacy
  • Data Center & Server Infrastructure
  • Digital Transformation & Strategy
  • Enterprise Software & DevOps
  • Global Telecom News
  • Internet of Things & Automation
  • Network Infrastructure & 5G
  • Semiconductors & Hardware
  • Space & Satellite Tech
©2026 MagnaNet Network | WordPress Theme by SuperbThemes