Thousands of cryptocurrencycryptocurrency users have reportedly been the victim of cryptocrypto apps that were advertised as legitimate, but secretly contained malware that infiltrated users’ computers and stole information, including cryptocurrency walletwallet keys.
Security firm Intezer Labs discovered and extensively detailed the exploit, which it has dubbed ElectroRAT, in a report issued today. The malware was first discovered in December, although data from a pastebin used by the exploit suggests that it has been in the wild since at least January 8, 2020.
[1/7] Operation #ElectroRAT is a new campaign that takes sizable measures to steal crypto wallets. For more information about the operation - https://t.co/CWLnOevKir
The following is a technical analysis->@IntezerLabs
The sophisticated campaign involved a trio of cryptocurrency apps developed for Windows, macOS, and Linux called Jamm, eTrade (or Kintum), and DaoPoker. Intezer describes the exploit as “extremely intrusive,” capable of keylogging, downloading and executing files, uploading files, and taking screenshots without a user’s knowledge.
In its report, Intezer shows how the software applications were promoted and distributed via cryptocurrency forums and Twitter. All told, based on the number of unique users to the exploit’s pastebin, the firm believes that at least 6,500 users were impacted by the malware.
The fake software was created using app-building platform Electron and coded from scratch in the Go language, rather than using pre-built, off-the-shelf malware code. According to Intezer Labs, using Go likely made it easier for the creators to rapidly develop versions for multiple platforms, while ZDNet notes that the complexity of the language makes analyzing and detecting malware more difficult.
The Electrum malware scam has struck again. Today, 2 Bitcoin (32,876) was sent to a known scam address.
Malware refers to a collective of malicious software that includes ransomware and spyware. It is typically designed to cause extensive damage to infected computers or to gain access to private networks. Now, an address using a known Electrum wallet exploit has claimed another victim.
“A payment of 2.042 #BTC (32,876 USD) was just made to a confirmed Malware scam!” tweeted Whale Alert.
🚔 A...
“Writing the malware from scratch has also allowed the campaign to fly under the radar for almost a year by evading all antivirus detections,” Intezer Labs writes.
If you have used any of the fraudulent apps mentioned above, Intezer has a breakdown of how to detect the processes and clear your system using its software. The firm also suggests moving crypto assets to a different wallet and changing all of your passwords.
Daily Debrief Newsletter
Start every day with the top news stories right now, plus original features, a podcast, videos and more.
Bitcoin’s most outspoken bull, Michael Saylor, isn’t losing sleep over what some call its biggest existential threat: quantum computing.
In an interview with Bloomberg on Tuesday, the Strategy co-founder dismissed fears that future quantum machines could one day unravel Bitcoin’s cryptographic foundations, calling the threat overhyped and ultimately easy to overcome.
“I don't worry about it,” he said. “Microsoft and Google market their quantum projects, but they would never sell a quantum comput...
Several Waymo autonomous taxis were vandalized and set on fire Sunday during a protest against the U.S. Immigration and Customs Enforcement raids in Los Angeles and the Trump administration’s deployment of National Guard into the region.
What the vehicles were doing there—who sent them, and why—is thus far unknown. Viral videos posted to social media show demonstrators climbing atop the self-driving taxis, smashing windows, and spray-painting the sides of the taxis. At least five vehicles were s...
Cetus Protocol, the leading decentralized exchange on the Sui blockchain, is officially back online after a malicious oracle attack led to an exploit of $233 million in May.
The exploit, which sent multiple SUI-based tokens tumbling 70-90%, manipulated price curves and reserve calculations, allowing the attacker to remove liquidity from pools on the DEX.
“The attacker exploited a vulnerability in a CLMM-dependent open source library, drained assets from our major pools, and conducted a large n...