Skip to content
Back to Home
A padlock attached to a door with the word master written on it

Photo by Mohamed Marey on Unsplash

Torg Grabber & Supply Chain Attacks Hit Crypto and Open-Source

Executive Summary

Over 700 crypto wallets and 850 browser extensions are under attack by the Torg Grabber infostealer malware, which steals sensitive data including private keys and passwords. To mitigate this threat, cryptocurrency users should ensure their wallets and browser extensions are updated with the latest security patches, use reputable antivirus software, enable two-factor authentication (2FA) wherever possible, and be cautious when installing new software or extensions.

Introduction to Today's Threat Landscape

A staggering 700 crypto wallets and 850 browser extensions are under attack by the newly discovered Torg Grabber infostealer malware, as BleepingComputer reports, highlighting the escalating threat landscape faced by cryptocurrency users and open-source software developers. This emerging threat is compounded by supply chain attacks on prominent repositories like PyPI and Docker Hub, where malicious actors have compromised packages to steal credentials and authentication tokens from hundreds of thousands of devices, according to SecurityWeek and BleepingComputer. The impact of these attacks can be severe, leading to financial loss, data breaches, and compromised systems.

The increasing reliance on cryptocurrency and open-source software has created an expansive attack surface that malicious actors are eager to exploit. For instance, the Torg Grabber malware targets a wide range of crypto wallets and browser extensions, including MetaMask, Ledger Live, and Binance Chain Wallet. This breadth of targeting underscores the necessity for cryptocurrency users to be vigilant about the security of their digital assets. Similarly, the supply chain attacks on PyPI and Docker Hub highlight the vulnerabilities in the open-source software supply chain, where a single compromised package can have far-reaching consequences.

Torg Grabber Infostealer Malware Targets Crypto Wallets

The Torg Grabber infostealer malware has been identified as a significant threat to cryptocurrency users, with its ability to steal sensitive data from over 700 crypto wallets and 850 browser extensions, as reported by BleepingComputer. This targeted campaign underscores the increasing risk of infostealer malware to financial information, particularly in the context of cryptocurrency transactions. By stealing login credentials and private keys, attackers can gain unauthorized access to crypto wallets, leading to potential financial losses for users.

Technically, Torg Grabber operates by scanning the system for wallet software and browser extensions, then extracting sensitive data such as private keys, passwords, and seed phrases. This is achieved through a combination of API hooks and memory scraping techniques, allowing the malware to bypass traditional security measures. The malware's ability to evade detection and its wide range of targets make it a formidable threat in the cryptocurrency ecosystem.

To mitigate this threat, cryptocurrency users should:

  • Ensure their wallets and browser extensions are updated with the latest security patches.
  • Use reputable antivirus software.
  • Enable two-factor authentication (2FA) wherever possible.
  • Be cautious when installing new software or extensions, only using trusted sources and reading reviews carefully.

Supply Chain Attacks on Open-Source Software

The TeamPCP hacking group has been implicated in a series of supply chain attacks targeting open-source software packages on PyPI and Docker Hub, resulting in the theft of credentials and authentication tokens from hundreds of thousands of devices, according to SecurityWeek and BleepingComputer. The compromise of the LiteLLM Python package on PyPI is a notable example, where the package was backdoored to steal credentials and auth tokens, as The Record reports.

The attacks on PyPI and Docker Hub involve the compromise of package maintainers' accounts, allowing attackers to upload malicious versions of popular packages. Once a package is compromised, it can be used to steal sensitive information from any system that installs or updates it, creating a ripple effect throughout the software supply chain.

Mitigating these supply chain attacks requires:

  • Developers implementing secure development practices, including the use of secure communication protocols (like HTTPS) for package updates and the verification of package integrity through digital signatures.
  • Users keeping their systems and software up to date, using trusted sources for packages, and monitoring system logs for suspicious activity.

PolyShell Attacks on Magento Stores

Attacks leveraging the PolyShell vulnerability are currently targeting over half of all vulnerable Magento stores, with more than 56% of these stores at risk, as BleepingComputer notes. This vulnerability affects version 2 of Magento Open Source and Adobe Commerce installations, making it crucial for store owners to prioritize patching this vulnerability to prevent exploitation.

The PolyShell vulnerability allows attackers to execute arbitrary code on the server, potentially leading to a complete takeover of the store. To protect against PolyShell attacks, store owners should:

  • Apply the latest security patches to their Magento installations.
  • Ensure all extensions and plugins are updated and come from trusted sources.
  • Implement a Web Application Firewall (WAF) to detect and block suspicious traffic.
  • Regularly monitor system logs for signs of unauthorized access or malicious activity.

Recommendations and Takeaways

Given the complexity and severity of these threats, several key recommendations emerge:

  • Cryptocurrency users should be cautious when using crypto wallets and browser extensions, ensuring that they use reputable sources and keep their software up to date.
  • Open-source software developers must prioritize security, regularly monitoring their packages for suspicious activity and implementing robust security measures to prevent supply chain attacks.
  • Magento store owners should patch the PolyShell vulnerability immediately to prevent exploitation and potential data breaches.
  • All users should stay informed about emerging threats, taking proactive steps to protect themselves from infostealer malware and supply chain attacks by keeping their systems and software up to date and being vigilant about the sources of their software packages.

To maintain a secure posture, individuals and organizations should:

  • Use strong, unique passwords for all accounts.
  • Enable two-factor authentication (2FA) wherever possible.
  • Regularly back up sensitive data.
  • Conduct frequent security audits and penetration testing to identify vulnerabilities.

By following these recommendations and staying abreast of the evolving threat landscape, individuals and organizations can significantly reduce their risk exposure to these high-severity threats. The cybersecurity community must remain vigilant, sharing information and best practices to combat these emerging threats effectively.

Sources
Related Articles
ProjectZyper AI ProjectZyper AI

AI-powered cybersecurity threat intelligence. Aggregated, analyzed, and published daily.

Powered by AI

Status

Monitoring threat feeds — updated hourly

AI-generated content. Verify critical information independently.

© 2026 ProjectZyper AI. All rights reserved.