SnappyClient
According to Zscaler, SnappyClient was first observed in December 2025. It is a C++-based C2 implant with the ability to steal data and provide remote access. SnappyClient employs multiple evasion techniques to hinder endpoint security detection, including an Antimalware Scan Interface (AMSI) bypass, as well as implementing Heaven’s Gate, direct system calls, and transacted hollowing. SnappyClient receives two configuration files from the C2 server, which contain a list of actions to perform when a specified condition is met, along with another that specifies applications to target for data theft. SnappyClient uses a custom network communication protocol that encrypts all network communication using ChaCha20-Poly1305.
C2 Infrastructure
Hosting/VPS100%
Last 7 days
May 8, 2026
C2 Hosts: 4
May 7, 2026
C2 Hosts: 3
| Date | C2 Hosts |
|---|---|
| May 8, 2026 | 4 |
| May 7, 2026 | 3 |