Netcrook Logo
👤 TRUSTBREAKER
🗓️ 31 Jan 2026   🌍 Middle-East

Stealing in the Shadows: How TAMECAT’s PowerShell Backdoor Prowls for Browser Credentials

Subtitle: An Iranian APT’s stealthy malware campaign targets Edge and Chrome, putting sensitive logins at risk for high-profile victims.

Imagine logging into your browser, thinking your credentials are safe - only to find out a silent intruder has been lurking, harvesting your secrets in real time. This is the chilling reality facing government and defense officials targeted by TAMECAT, a cunning PowerShell-based backdoor linked to Iran’s notorious APT42. With an arsenal of obfuscation tricks and an appetite for browser credentials, TAMECAT is reshaping the threat landscape for those who wield power and secrets.

Anatomy of a Targeted Espionage Tool

Unlike run-of-the-mill malware, TAMECAT is designed for precision espionage. According to recent research by Israel’s National Digital Agency, this backdoor is deployed in long-term campaigns against high-value targets - think senior defense and government officials. Its infection chain is both adaptive and stealthy. The initial VBScript downloader checks for antivirus products using WMI queries; depending on what it finds, it adjusts its payload delivery method, either through PowerShell or cmd.exe with curl.

Once inside, TAMECAT’s loader (hidden as nconf.txt) unleashes AES-encrypted modules that decrypt in memory. The backdoor meticulously gathers system information, generates a unique victim ID, and communicates with its command server - using HTTPS POST requests camouflaged with custom headers. The malware’s modular nature means it can fetch additional scripts as needed, including tools for screen captures or browser data theft, all while avoiding suspicious disk activity.

Credential Theft in Plain Sight

The core of TAMECAT’s mission: extracting browser credentials without tipping off defenses. The backdoor suspends Chrome processes and leverages Edge’s remote debugging interface to dump saved passwords and session data. By writing directly to memory, TAMECAT sidesteps traditional antivirus detection. Its obfuscation tactics - fragmented arrays, wildcards, and string replacements - echo techniques seen in other advanced malware, making forensic analysis a headache for defenders.

Command and Control: The Social Side of Espionage

APT42 operators control TAMECAT via Telegram bots and, in some cases, Discord channels. Commands arrive in encrypted, base64-encoded chunks, specifying the language, thread, and execution flags. This flexibility allows attackers to adapt on the fly, making detection and disruption even harder. The group’s use of social engineering to build trust with targets before infection further raises the stakes, demonstrating a blend of technical acumen and psychological manipulation.

Defensive Moves in a High-Stakes Game

While TAMECAT’s tactics are evolving, experts recommend a layered approach: endpoint detection and response tools, strict PowerShell execution policies, and vigilant monitoring of scripting activity. Organizations should prioritize browser security and enable detailed logging to catch anomalous behaviors - especially as state-backed cyber threats continue to rise.

As TAMECAT prowls the digital corridors of government and defense, its ability to steal in silence is a stark reminder: in the world of espionage, the most dangerous threats are often the ones you never see coming.

WIKICROOK

  • Backdoor: A backdoor is a hidden way to access a computer or server, bypassing normal security checks, often used by attackers to gain secret control.
  • PowerShell: PowerShell is a Windows scripting tool used for automation, but attackers often exploit it to perform malicious actions stealthily.
  • AES Encryption: AES Encryption is a powerful method for converting data into a secure format, ensuring only authorized parties can access the original information.
  • Command: A command is an instruction sent to a device or software, often by a C2 server, directing it to perform specific actions, sometimes for malicious purposes.
  • Obfuscation: Obfuscation is the practice of disguising code or data to make it difficult for humans or security tools to understand, analyze, or detect.
TAMECAT Credential Theft APT42

TRUSTBREAKER TRUSTBREAKER
Zero-Trust Validation Specialist
← Back to news