Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsTAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk
TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk
Cybersecurity

TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk

•January 30, 2026
0
GBHackers On Security
GBHackers On Security•Jan 30, 2026

Companies Mentioned

Microsoft

Microsoft

MSFT

Telegram

Telegram

MITRE

MITRE

Why It Matters

The theft of browser credentials gives APT42 direct access to privileged accounts, escalating espionage risk for targeted organizations and underscoring the need for stronger endpoint and browser hardening.

Key Takeaways

  • •TAMECAT uses PowerShell backdoor to steal Edge, Chrome credentials
  • •Operates via Telegram bots and encrypted loaders
  • •Detects AV products before choosing download method
  • •Exploits browser remote debugging to dump passwords in memory
  • •Mitigation: script-block logging, disable remote debugging, monitor VBScript launches

Pulse Analysis

The emergence of TAMECAT reflects a growing trend among nation‑state actors to weaponize PowerShell for stealthy credential harvesting. Linked to Iran’s APT42, the backdoor combines a multi‑stage delivery chain—starting with a VBScript downloader that performs AV reconnaissance—and an AES‑encrypted loader that evades static analysis. By leveraging Telegram bots for command‑and‑control, the operators maintain low‑profile communications while dynamically pulling additional modules, a tactic that complicates traditional signature‑based detection.

Technical analysis reveals that TAMECAT’s loader decrypts components named Gorba and Borjol, which orchestrate in‑memory execution of PowerShell and C# payloads. The malware suspends Chrome and Edge processes, then taps into their remote‑debugging protocols to dump saved passwords directly from memory, avoiding file system artifacts. Network traffic is funneled to obscure domains such as accurate‑sprout‑porpoise.glitch.me, with data encrypted via AES‑256 before exfiltration, demonstrating a sophisticated blend of obfuscation and covert channel usage.

For enterprises, the incident underscores the urgency of layered defenses. Enabling PowerShell script‑block logging, enforcing execution policies for signed scripts, and monitoring for anomalous VBScript launches can surface early indicators. Additionally, hardening browsers—disabling remote debugging, applying credential protection policies, and segmenting privileged accounts—reduces the attack surface. As APT42 continues to refine its toolkit, organizations must adopt proactive threat‑hunting and continuous monitoring to mitigate the elevated risk posed by advanced PowerShell backdoors.

TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...