New ‘Beep’ malware uses evasion techniques to steal sensitive data

February 15, 2023

Minerva analysts have discovered a new malware called ‘Beep,’ which is still in development and employs several features to avoid detection and analysis by security software. Beep malware is a data stealer that is designed to collect sensitive data from victims’ computers.

The malware is composed of three parts: a dropper, an injector, and the payload. The dropper and injector are designed to work together to download the payload, which is then used to steal information.

To avoid detection by security software, Beep employs a variety of evasion techniques, including anti-debugging, anti-VM, and anti-sandboxing techniques. It is also intended to avoid dynamic analysis, a technique used by security analysts to examine malware samples.

The malware is activated by C2 commands that perform specific functions such as capturing screenshots, logging keystrokes, and stealing sensitive information. Minerva analysts were able to identify these functions and determine how the C2 commands triggered them.

The Minerva sample is still in development, but as it is refined, it is expected to become more sophisticated. The fact that it has already been uploaded to VirusTotal suggests that some threat actors are already using it.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn