LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

Post on X LinkedIn
Brazilian LofyGang Resurfaces After Three Years With Minecraft LofyStealer Campaign

A cybercrime group of Brazilian origin has resurfaced after more than three years to orchestrate a campaign that targets Minecraft players with a new stealer called LofyStealer (aka GrabBot). “The malware disguises itself as a Minecraft hack called ‘Slinky,'” Brazil-based cybersecurity company ZenoX said in a technical report. “It uses the official game icon to induce voluntary execution,

The report was published by The Hacker News with a current urgency rating of 5/10 for this queue. Security teams should treat this as a timely item to review, especially where the affected products, vendors, or techniques overlap with their environment.

// 01 What We Know So Far

The source item was published at 2026-04-28T23:09:00+05:30 and is being tracked from The Hacker News. The available RSS summary indicates that the story is relevant because it matches site topics; published in the last 24 hours; contains high-urgency security terms. Review the original report for full technical context, affected versions, and any vendor-specific remediation details.

Where a CVE, patch advisory, active exploitation note, or public proof-of-concept is involved, validate the details against the vendor advisory before making production changes. At the time this draft was generated, the RSS feed was the primary source used for this queue entry.

// 02 What You Should Do Now

  • Read the source report and confirm whether your organization uses the affected product, service, or dependency.
  • Check vendor advisories for patched versions, mitigations, indicators of compromise, or detection logic.
  • Prioritize exposed internet-facing systems, privileged services, and high-value environments first.
  • Add the story to the next security review or incident triage cycle if it matches your technology stack.
  • Keep this draft updated with confirmed version numbers and direct advisory links before publishing.

Sources: The Hacker News

For any query contact us at contact@cipherssecurity.com

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous Chrome 147 and Firefox 150 Patch Critical Code Execution Vulnerabilities Next Iran-Linked Handala Group Sends Threatening WhatsApp Messages to US Troops, Leaks 2,379 Marines' Data

    Latest News

    CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months A Nightwing contractor exposed CISA's AWS GovCloud credentials and internal system keys on a public GitHub repo for… Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities Belarus-aligned APT Ghostwriter (UAC-0057) is targeting Ukrainian government with Prometheus-themed phishing delive… Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign Iran-aligned Screening Serpens is using AppDomainManager hijacking and new RAT variants — MiniJunk and MiniUpdate —… CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites CVE-2026-9082 is an unauthenticated SQL injection in Drupal Core affecting PostgreSQL deployments across versions 8… CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited CVE-2026-20182 (CVSS 10.0 Critical) is a Cisco Catalyst SD-WAN Controller auth bypass exploited by UAT-8616. Metasp… Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning FBI warns Kali365 PhaaS kit steals Microsoft 365 OAuth tokens, bypassing MFA. Hundreds of orgs compromised daily. A… Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection Megalodon supply chain attack compromised 5,561 GitHub repos in 6 hours on May 18, injecting malicious CI/CD workfl… Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content A Russian-speaking fraudster used 73 stolen Gemini API keys and an automated Python pipeline to generate fake QAnon…
    Scroll to Top
    Ad