• News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Wednesday, December 17, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home » REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

The campaign targets users searching for popular titles ranging from John Buchan's "The Thirty-Nine Steps" in Turkish to Arabic texts on poetry, folklore and religious practices.

Peter Oluka by Peter Oluka
December 17, 2025
in Security
Reading Time: 2 mins read
0
Cybercriminals Using Popular Turkish, Arabic Books as Bait to Steal Personal Data

Data privacy is key

UBA
Advertisements

The Kaspersky Global Research & Analysis Team has uncovered a malware-as-a-service campaign targeting ebook readers across Turkey, Egypt, Bangladesh and Germany.

Cybercriminals are disguising sophisticated malware as bestselling Turkish and Arabic books, tricking hundreds of readers into downloading files that steal passwords, cryptocurrency wallets and other sensitive information from their computers.

Kaspersky has identified a malware-as-a-service (MaaS) campaign that is using LazyGo, a newly discovered Go-based loader that delivers multiple information-stealing programs.

ADVERTISEMENT

The campaign targets users searching for popular titles ranging from John Buchan’s “The Thirty-Nine Steps” in Turkish to Arabic texts on poetry, folklore and religious practices.

The fake ebooks span diverse interests, including also Turkish business management texts like Tamer Koçel’s “İşletme Yöneticiliği,” contemporary fiction, and Arabic literary criticism such as “The Literary and Linguistic Movement in the Sultanate of Oman.”

The malicious files masquerade as PDF ebooks but are actually executable programs with PDF icons. When users download and open these fake books, the LazyGo loader deploys infostealers including StealC, Vidar and ArechClient2.

Kaspersky researchers identified three variants of LazyGo, each employing different evasion techniques such as API unhooking, AMSI bypass, ETW disabling and anti-virtual machine detection.

Cybercriminals Using Popular Turkish, Arabic Books as Bait
Credit: Kaspersky
MTN New

The information that the attackers steal includes:

  • Browser data: Saved passwords, cookies, autofill information and browsing history from Chrome, Edge, Firefox and other browsers.
  • Financial assets: Cryptocurrency wallet extensions, configuration files and storage data.
  • Developer credentials: AWS credentials, Azure CLI tokens and Microsoft Identity Platform tokens.
  • Communication platforms: Discord tokens, Telegram Desktop data and Steam session files.
  • System information: Hardware specifications, installed software and running processes.

Victims infected with ArechClient2/SectopRAT face additional risk as attackers gain complete remote control over compromised machines.

“What makes this campaign particularly concerning is its use of a malware-as-a-service model combined with highly targeted social engineering,” said Yossef Abdelmonem, senior security researcher at Kaspersky GReAT. “The LazyGo loader’s multiple variants and sophisticated evasion techniques show this isn’t opportunistic cybercrime – it’s a structured operation designed to harvest credentials at scale. Organisations should be especially vigilant as stolen developer tokens and cloud credentials can provide attackers with deep access to corporate infrastructure.”

Kaspersky telemetry shows that the campaign is affecting government agencies, educational institutions, IT services and other sectors.

The campaign remains active with threat actors continuously uploading new malicious ebooks to GitHub and compromised websites.

Kaspersky experts recommend users verify ebook sources before downloading, carefully examine file properties, and maintain updated security software capable of detecting evasive malware techniques.

When selecting a security solution, it’s advisable to choose one with robust anti-malware capabilities that have been validated through independent testing.

0Shares

stanbic
Peter Oluka

Peter Oluka

Peter Oluka (@peterolukai), editor of Techeconomy, is a multi-award winner practicing Journalist. Peter’s media practice cuts across Media Relations | Marketing| Advertising, other Communications interests. Contact: peter.oluka@techeconomy.ng

Next Post
Mergers and Acquisitions

Premier Paints Shareholders Plan Sale

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.