Non Cult Crypto News

Non Cult Crypto News

in

Crypto swiping malware infects 28K users, steals just $6K: Report

A cryptojacking and stealing malware infected tens of thousands of devices over the past few months, but the attackers made off with only around $6,000.

Own this piece of crypto history

Collect this article as NFT

COINTELEGRAPH IN YOUR SOCIAL FEED

Malware has infected tens of thousands of users to take over their devices to mine and try to steal crypto — but it only ended up bagging around $6,000.

Cybersecurity firm Doctor Web reported on Oct. 8 that it detected malware disguising itself as legitimate software, such as office programs, game cheats, and online trading bots.

The cryptojacking and stealing software infected over 28,000 users, mainly in Russia but also in Belarus, Uzbekistan, Kazakhstan, Ukraine, Kyrgyzstan, and Turkey.

The hackers were only able to get hold of about $6,000 worth of crypto, according to Doctor Web. However, it’s unknown how much the malware’s creator may have earned from crypto mining.

The cybersecurity firm said that the sources of the malware included fraudulent GitHub pages and YouTube video descriptions with malicious links.

Once a device is infected, stealthily deployed software hijacks computing resources to mine crypto.

A “Clipper” also monitors crypto wallet addresses users copy onto their device’s clipboard, and the malware replaces it with addresses controlled by the attacker — which is how they swiped a small crypto haul.

Malware attack chain. Source: Doctor Web

The malware uses sophisticated techniques to avoid detection, including password-protected archives to bypass antivirus scans, disguising malicious files as legitimate system components, and using legitimate software to execute malicious scripts.

In September, crypto exchange Binance warned about the Clipper malware noting a spike in activity in late August, “leading to significant financial losses for affected users.”

Doctor Web said many of the malware victim’s devices were compromised “by installing pirated versions of popular programs” and recommended only installing software from an official source.

Related: New Android malware steals private keys from screenshots and images

Clipboard-changing malware has been around for years and was particularly prominent after the 2017 crypto bull market. 

These types of malware programs have become more sophisticated, often combining clipboard jacking with other malicious functions.

In September, threat intelligence firm Facct reported that malicious actors and scammers were exploiting email auto-replies to spread crypto mining malware.

Magazine: $55M DeFi Saver phish, copy2pwn hijacks your clipboard: Crypto Sec

This article first appeared at Cointelegraph.com News

What do you think?

Written by Outside Source

Retail investors increasingly buying crypto despite volatility: IOSCO

Is China About to Dump $1.3B in ETH From PlusToken Seizure?

Back to Top

Ad Blocker Detected!

We've detected an Ad Blocker on your system. Please consider disabling it for Non Cult Crypto News.

How to disable? Refresh

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website.

Add to Collection

No Collections

Here you'll find all collections you've created before.