New ‘Beep’ malware uses evasion techniques to steal sensitive data

February 15, 2023

Minerva analysts have discovered a new malware called ‘Beep,’ which is still in development and employs several features to avoid detection and analysis by security software. Beep malware is a data stealer that is designed to collect sensitive data from victims’ computers.

The malware is composed of three parts: a dropper, an injector, and the payload. The dropper and injector are designed to work together to download the payload, which is then used to steal information.

To avoid detection by security software, Beep employs a variety of evasion techniques, including anti-debugging, anti-VM, and anti-sandboxing techniques. It is also intended to avoid dynamic analysis, a technique used by security analysts to examine malware samples.

The malware is activated by C2 commands that perform specific functions such as capturing screenshots, logging keystrokes, and stealing sensitive information. Minerva analysts were able to identify these functions and determine how the C2 commands triggered them.

The Minerva sample is still in development, but as it is refined, it is expected to become more sophisticated. The fact that it has already been uploaded to VirusTotal suggests that some threat actors are already using it.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

February 5, 2026 A security researcher at Koi named Oren Yomtov has uncovered a widespread malware operation embedded inside an more...

February 4, 2026 More than three million Fortinet devices have been exposed to a critical authentication-bypass vulnerability that is being more...

February 4, 2026 A now-patched security flaw in Docker’s built-in AI assistant exposed users to the risk of remote code more...

January 28, 2026 A suspected credit card skimming attack on the Canada Computers online store may have quietly exposed customer more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn