Bitcoin Forum
May 04, 2024, 11:17:31 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: New Malware Campaign Spreads Trojans Through Clone Crypto Trading Website  (Read 143 times)
roosbit (OP)
Member
**
Offline Offline

Activity: 891
Merit: 43

Random coins :)


View Profile
June 06, 2019, 09:32:53 AM
 #1

Twitter user and malware researcher Fumik0_ has discovered a new website that spreads cryptocurrency malware, according to a report by Bleeping Computer on June 5.

According to the report, the host for transmitting these viruses is a website that imitates the website for Cryptohopper, a website where users can program tools to perform automatic cryptocurrency trading.

When the scam site is visited, it reportedly automatically downloads a setup.exe installer, which will infect the computer once it runs. The setup panel will also display the logo of Cryptohopper in another attempt to trick the user.

Running the installer is said to install the Vidar information-stealing Trojan, which further installs two Qulab trojans for mining and clipboard hijacking. The clipper and miners are then deployed once every minute in order to continuously collect data.

The Vidar information-stealing trojan itself will attempt to scrape user data such as browser cookies, browser history, browser payment information, saved login credentials, and cryptocurrency wallets. The information is periodically compiled and sent to a remote server, after which the compilation is deleted.

The Qulab clipboard hijacker will attempt to substitute its own addresses in the clipboard when it recognizes that a user has copied a string that looks like a wallet address. This allows cryptocurrency transactions initiated by the user to get redirected to the attacker’s address instead.

This hijacker has address substitutions available for ether (ETH), bitcoin (BTC), bitcoin cash (BCH), dogecoin (DOGE), dash (DASH), litecoin (LTC), zcash (ZEC), bitcoin gold (BTG), xrp, and qtum.

One wallet reportedly associated with the clipper has received 33 BTC, or $258,335 at press time, via the substitution address ‘1FFRitFm5rP5oY5aeTeDikpQiWRz278L45,’ although this may not all have come from the Cryptohopper scam.

As previously reported by Cointelegraph, a YouTube-based crypto scam campaign was discovered in May, luring in victims with the promise of a free BTC generator. After users ran the alleged BTC generator, which was automatically downloaded by visiting the associated website, they would be infected with a Qulab trojan. Then, the Qulab trojan would attempt to steal user information and run a clipboard hijacker for crypto addresses.

Source https://cointelegraph.com/news/new-malware-campaign-spreads-trojans-through-clone-crypto-trading-website
1714821451
Hero Member
*
Offline Offline

Posts: 1714821451

View Profile Personal Message (Offline)

Ignore
1714821451
Reply with quote  #2

1714821451
Report to moderator
1714821451
Hero Member
*
Offline Offline

Posts: 1714821451

View Profile Personal Message (Offline)

Ignore
1714821451
Reply with quote  #2

1714821451
Report to moderator
If you want to be a moderator, report many posts with accuracy. You will be noticed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714821451
Hero Member
*
Offline Offline

Posts: 1714821451

View Profile Personal Message (Offline)

Ignore
1714821451
Reply with quote  #2

1714821451
Report to moderator
xvids
Sr. Member
****
Offline Offline

Activity: 1176
Merit: 301



View Profile
June 06, 2019, 07:34:30 PM
 #2

Twitter user and malware researcher Fumik0_ has discovered a new website that spreads cryptocurrency malware, according to a report by Bleeping Computer on June 5.


Source https://cointelegraph.com/news/new-malware-campaign-spreads-trojans-through-clone-crypto-trading-website
-SNIP-
Thanks for sharing it and updating us about the issue ,
This is the reason why people should always check the site that they have been visiting and make sure that it is the right site.
We are all aware of Phishing attacks but this kind of attack is on another level so we should be really careful on the sites that we open and don't just click any link.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!