By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Computing

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

News Room
Last updated: 2026/01/05 at 3:48 AM
News Room Published 5 January 2026
Share
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
SHARE

Jan 05, 2026Ravie LakshmananThreat Intelligence / Windows Security

Cybersecurity researchers have disclosed details of a new Python-based information stealer called VVS Stealer (also styled as VVS $tealer) that’s capable of harvesting Discord credentials and tokens.

The stealer is said to have been on sale on Telegram as far back as April 2025, according to a report from Palo Alto Networks Unit 42.

“VVS stealer’s code is obfuscated by Pyarmor,” researchers Pranay Kumar Chhaparwal and Lee Wei Yeong said. “This tool is used to obfuscate Python scripts to hinder static analysis and signature-based detection. Pyarmor can be used for legitimate purposes and also leveraged to build stealthy malware.”

Advertised on Telegram as the “ultimate stealer,” it’s available for €10 ($11.69) for a weekly subscription. It can also be purchased at different pricing tiers: €20 ($23) for a month, €40 ($47) for three months, €90 ($105) for a year, and €199 ($232) for a lifetime license, making it one of the cheapest stealers for sale.

Cybersecurity

According to a report published by Deep Code in late April 2025, the stealer is believed to be the work of a French-speaking threat actor, who is also active in stealer-related Telegram groups such as Myth Stеaler and Еуes Steаlеr GC.

The Pyarmor-protected VVS Stealer malware is distributed as a PyInstaller package. Once launched, the stealer sets up persistence by adding itself to the Windows Startup folder to ensure that it’s automatically launched following a system reboot.

It also displays fake “Fatal Error” pop-up alerts that instruct users to restart their computers to resolve an error and steal a wide range of data –

  • Discord data (tokens and account information)
  • Web browser data from Chromium and Firefox (cookies, history, passwords, and autofill information)
  • Screenshots

VVS Stealer is also designed to perform Discord injection attacks so as to hijack active sessions on the compromised device. To achieve this, it first terminates the Discord application, if it’s already running. Then, it downloads an obfuscated JavaScript payload from a remote server that’s responsible for monitoring network traffic via the Chrome DevTools Protocol (CDP).

“Malware authors are increasingly leveraging advanced obfuscation techniques to evade detection by cybersecurity tools, making their malicious software harder to analyze and reverse-engineer,” the company said. “Because Python is easy for malware authors to use and the complex obfuscation used by this threat, the result is a highly effective and stealthy malware family.”

Cybersecurity

The disclosure comes as Hudson Rock detailed how threat actors are using information stealers to siphon administrative credentials from legitimate businesses and then leverage their infrastructure to distribute the malware via ClickFix-style campaigns, creating a self-perpetuating loop.

“A significant percentage of domains hosting these campaigns are not malicious infrastructure set up by attackers, but legitimate businesses whose administrative credentials were stolen by the very infostealers they are now distributing,” the company said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Ikea’s new  USB-C charger is cheaper than Apple’s and Anker’s Ikea’s new $4 USB-C charger is cheaper than Apple’s and Anker’s
Next Article Zombie or phoenix? The Galaxy S26 Edge seemingly rises again after being proclaimed dead Zombie or phoenix? The Galaxy S26 Edge seemingly rises again after being proclaimed dead
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

GStreamer 1.28-RC1 Brings A Rust-Based GIF Decoder, Other New Rust Components
GStreamer 1.28-RC1 Brings A Rust-Based GIF Decoder, Other New Rust Components
Computing
Apex Rides raises £420k to advance its connected fitness platform – UKTN
Apex Rides raises £420k to advance its connected fitness platform – UKTN
News
everything that is homey is bad for your health
everything that is homey is bad for your health
Mobile
The best Samsung soundbar? This power monster installs in the blink of an eye
The best Samsung soundbar? This power monster installs in the blink of an eye
Mobile

You Might also Like

GStreamer 1.28-RC1 Brings A Rust-Based GIF Decoder, Other New Rust Components
Computing

GStreamer 1.28-RC1 Brings A Rust-Based GIF Decoder, Other New Rust Components

1 Min Read
New HarmonyOS screenshots leaked ahead of Huawei Developer Conference 2024 · TechNode
Computing

New HarmonyOS screenshots leaked ahead of Huawei Developer Conference 2024 · TechNode

1 Min Read
Unseen Workload Optimization: The Two-Phase IA2 Approach | HackerNoon
Computing

Unseen Workload Optimization: The Two-Phase IA2 Approach | HackerNoon

1 Min Read
Transparent Hugepage Performance On Linux 6.18 LTS: Madvise vs. Always Review
Computing

Transparent Hugepage Performance On Linux 6.18 LTS: Madvise vs. Always Review

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?