Non Cult Crypto News

Non Cult Crypto News

in

Ambient Finance website hacked, team warns users to wait for fix

In 2024, malware spread through Python Package Index, text messages, fraudulent macOS programs, and even automated email threads.

COINTELEGRAPH IN YOUR SOCIAL FEED

The frontend for Ambient Finance — a decentralized trading protocol — was compromised on Oct. 17, and the team has warned users not to interact with the site, connect wallets, or sign transactions at this time.

According to Ambient Finance, the website domain was hacked, but the hijacked website is an isolated incident. The team reassured customers that Ambient contracts and funds remain safe.

Shortly following the hack, Ambient Finance managed to recover the domain but is currently waiting on DNS to update and propagate. Spokespeople for Ambient warned users to wait for an “all clear” to interact with the website again.

Security firm Blockaid revealed that the infamous Inferno Drainer — a malware suite designed to steal digital assets — was used in the hack, and noted that the C2 server that launched the attack was created 24 hours ahead of the incident.

Source: Blockaid

Related: Crypto-stealing malware discovered in Python Package Index — Checkmarx

Respect every click: malware becomes more sophisticated

Unfortunately, the Ambient Finance hack is not unique and malware attacks are becoming increasingly sophisticated. Developers have long believed that Apple’s macOS was generally immune to malware.

However, there has been a recent uptick in malware targeting macOS systems. In August 2024, a new form of malware called “Cthulhu Stealer” was identified by cybersecurity firms.

Cthulhu Stealer disguises itself as a genuine macOS program that is installed on the desktop and steals sensitive data, and private keys — emptying crypto wallets in the process.

Security specialists at McAfee Labs discovered malware targeting Android operating systems called “SpyAgent” in September. SpyAgent uses optical character recognition to scan images and steal sensitive information stored in the images — this includes pictures taken of private keys.

SpyAgent spread through text message links that initiated downloads of seemingly harmless applications, which were just disguised versions of the malware. Researchers at McAfee identified over 280 fraudulent applications all tied to SpyAgent.

Cybersecurity firm Facct also recently uncovered a unique method of malware distribution that uses automated emails to install modified XMrig mining software. This modification of the legitimate software allows malicious actors to mine cryptocurrencies using the compromised devices of victims.

Magazine: Fake Rabby Wallet scam linked to Dubai crypto CEO and many more victims

This article first appeared at Cointelegraph.com News

What do you think?

Written by Outside Source

Experts say Lunex Network will mirror SUI price surge followed closely by Chainlink

Bitcoin-focused protocol Surge nabs $1.8m to bring Move-based rollups

Back to Top

Ad Blocker Detected!

We've detected an Ad Blocker on your system. Please consider disabling it for Non Cult Crypto News.

How to disable? Refresh

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website.

Add to Collection

No Collections

Here you'll find all collections you've created before.