Torg Grabber Steals from 728 Crypto Wallets via ClickFix
New Torg Grabber infostealer targets 728 cryptocurrency wallet extensions and 103 password managers. Spreads via ClickFix clipboard hijacking with Cloudflare-based exfiltration.
Security researchers at Gen Digital have identified a rapidly evolving infostealer called Torg Grabber that targets an astonishing 728 cryptocurrency wallet browser extensions, making it one of the most comprehensive crypto-focused threats observed this year. The malware spreads through ClickFix attacks that hijack victims' clipboards, tricking them into executing malicious PowerShell commands.
Between December 2025 and February 2026, researchers identified 334 unique Torg Grabber samples with new command-and-control servers registered weekly, indicating active and well-resourced development. The threat has already compromised an unknown number of victims across 40 identified operator tags.
What Torg Grabber Steals
The scope of Torg Grabber's targeting is extensive. Beyond the 728 crypto wallet extensions, the malware also harvests data from:
- 103 password manager and two-factor authentication browser extensions (including LastPass, 1Password, Bitwarden, KeePass, NordPass, Dashlane, and ProtonPass)
- 19 note-taking applications
- 25 Chromium-based browsers and 8 Firefox variants
- Discord, Telegram, Steam, VPN applications, and email clients
- Desktop cryptocurrency wallets outside the browser
The targeted crypto wallets include essentially every major platform: MetaMask, Phantom, TrustWallet, Coinbase Wallet, Binance, Exodus, TronLink, Ronin, OKX, Keplr, Rabby, Sui, and Solflare. This comprehensive targeting mirrors the approach we've seen from other sophisticated stealers that aim to maximize data extraction from each infected host.
ClickFix Distribution Method
Torg Grabber gains initial access through ClickFix-style attacks, a social engineering technique that's become increasingly prevalent across both Windows and macOS platforms. The attack hijacks the victim's clipboard and tricks them into pasting and executing a malicious PowerShell command.
The technique proves effective because users believe they're completing a legitimate verification step or software installation. Once executed, the malware deploys without requiring administrative privileges.
Technical Sophistication
Torg Grabber employs multiple evasion techniques that complicate detection and analysis:
- Multi-layered obfuscation with direct syscalls and reflective loading
- In-memory payload execution that leaves minimal disk artifacts
- App-Bound Encryption (ABE) bypass added in a December 22, 2025 update
- DLL injection into browsers via the COM Elevation Service
The ABE bypass capability is particularly concerning. Google introduced App-Bound Encryption in Chrome 127 specifically to prevent infostealers from accessing cookie data. Multiple malware families have since developed workarounds, and Torg Grabber's implementation demonstrates that this protective measure alone is insufficient.
Evolving Exfiltration Infrastructure
Torg Grabber's data exfiltration methods have evolved rapidly. Initial builds used Telegram-based communication and a custom encrypted TCP protocol. On December 18, 2025, both mechanisms were abandoned in favor of HTTPS connections routed through Cloudflare infrastructure.
This shift provides several advantages for the operators: the traffic blends with legitimate web activity, benefits from Cloudflare's reliability, and supports chunked uploads for handling large data sets. The infrastructure also complicates takedown efforts since Cloudflare services are widely used for legitimate purposes.
Detection and Monitoring
Gen Digital researchers noted that Torg Grabber profiles victim systems extensively, collecting hardware fingerprints and installed software inventories. Organizations should monitor for:
- Unexpected PowerShell execution from user context
- Browser processes spawning unusual child processes
- Network connections to unfamiliar Cloudflare-fronted endpoints
- Clipboard monitoring or manipulation activity
- Access to browser extension storage directories
The rapid development cadence (334 samples in three months) suggests Torg Grabber's operators are actively iterating based on detection feedback. Security teams should expect new evasion techniques to emerge continuously.
Why This Matters
Cryptocurrency wallet theft represents a particularly attractive target for threat actors because transactions are irreversible and wallets often contain substantial value. Unlike traditional credential theft where victims might recover compromised accounts, stolen crypto is gone permanently.
The 728-wallet targeting scope means Torg Grabber can hit users regardless of which platform they prefer. Combined with password manager targeting, a single infection could compromise both crypto assets and the credentials needed to access traditional financial accounts.
For readers wanting deeper context on how infostealers operate and defend against them, our malware fundamentals guide covers the technical mechanisms these threats employ.
Related Articles
NWHStealer Spreads via Fake Proton VPN Sites and Gaming Mods
Multiple campaigns distribute NWHStealer infostealer through counterfeit Proton VPN installers, gaming modifications, and YouTube-promoted downloads. Targets browser data and 25+ crypto wallets.
Apr 16, 2026Atomic Stealer Pivots to Script Editor After Apple Blocks Terminal
ClickFix attackers bypass macOS 26.4 Terminal paste scanning by using applescript:// URLs to launch Script Editor. Same payload, new delivery vector.
Apr 11, 2026SparkCat Crypto Stealer Returns to iOS and Android App Stores
Kaspersky discovers new SparkCat malware variants on Apple App Store and Google Play that use OCR to steal cryptocurrency wallet recovery phrases from photo galleries.
Apr 5, 2026AuraStealer Spreads Via TikTok Videos Posing as Software Tutorials
Russian-linked AuraStealer infostealer operates 48 C2 domains, steals crypto wallets and 2FA tokens, and spreads through fake software activation videos on TikTok.
Apr 1, 2026