Bitcoin Forum
May 09, 2024, 04:35:22 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Malware attack on btc blockchain through Electrum Wallet ?  (Read 166 times)
abhibtccc (OP)
Jr. Member
*
Offline Offline

Activity: 426
Merit: 7

https://blockstream.info , Blockonomics.co


View Profile WWW
September 08, 2019, 03:46:43 AM
 #1

Hello people,
I came through this article : https://www.forbes.com/sites/billybambrough/2019/09/07/serious-malware-warning-over-bitcoin-blockchain/

Can you analyse this  ?

██████ PLEASE CONTACT @btcrox on telegram FOR BITCOIN ACCELERATION██████
1715229322
Hero Member
*
Offline Offline

Posts: 1715229322

View Profile Personal Message (Offline)

Ignore
1715229322
Reply with quote  #2

1715229322
Report to moderator
1715229322
Hero Member
*
Offline Offline

Posts: 1715229322

View Profile Personal Message (Offline)

Ignore
1715229322
Reply with quote  #2

1715229322
Report to moderator
I HATE TABLES I HATE TABLES I HA(╯°□°)╯︵ ┻━┻ TABLES I HATE TABLES I HATE TABLES
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715229322
Hero Member
*
Offline Offline

Posts: 1715229322

View Profile Personal Message (Offline)

Ignore
1715229322
Reply with quote  #2

1715229322
Report to moderator
1715229322
Hero Member
*
Offline Offline

Posts: 1715229322

View Profile Personal Message (Offline)

Ignore
1715229322
Reply with quote  #2

1715229322
Report to moderator
pooya87
Legendary
*
Offline Offline

Activity: 3444
Merit: 10555



View Profile
September 08, 2019, 04:05:19 AM
Merited by ABCbits (1), hugeblack (1)
 #2

there is a malware called Glupteba that has been infecting computers for a couple of years. it exploits vulnerabilities in windows,... to infect and then steals sensitive information. later on it added a Monero miner to its code to also mine this altcoin on user's computers.
there is no bitcoin involved so far.

then there is this:
Quote
A router exploiter that attacks MikroTik routers in local network with the CVE-2018-14847 vulnerability. It will schedule a task on the router for command and control (C&C) and upload the stolen administrator credentials to a remote server. A compromised router will be configured as a SOCKS proxy to relay malicious traffic, matching the original purpose of the Glupteba botnet on Windows.

whenever they want to change these C&C servers they create a new bitcoin transaction to an address hardcoded in the malware and put the server address in its new OP_RETURN output.
then the malware uses the bitcoin network to fetch that bitcoin transaction using Electrum servers, reads the OP_RETURN data and decodes it to the server address and some additional info.

there is no "attack on btc blockchain" and has nothing to do with "electrum wallet" and there is no bitcoin being transferred using this malware either.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
abhibtccc (OP)
Jr. Member
*
Offline Offline

Activity: 426
Merit: 7

https://blockstream.info , Blockonomics.co


View Profile WWW
September 08, 2019, 06:49:14 AM
 #3

there is a malware called Glupteba that has been infecting computers for a couple of years. it exploits vulnerabilities in windows,... to infect and then steals sensitive information. later on it added a Monero miner to its code to also mine this altcoin on user's computers.
there is no bitcoin involved so far.

then there is this:
Quote
A router exploiter that attacks MikroTik routers in local network with the CVE-2018-14847 vulnerability. It will schedule a task on the router for command and control (C&C) and upload the stolen administrator credentials to a remote server. A compromised router will be configured as a SOCKS proxy to relay malicious traffic, matching the original purpose of the Glupteba botnet on Windows.

whenever they want to change these C&C servers they create a new bitcoin transaction to an address hardcoded in the malware and put the server address in its new OP_RETURN output.
then the malware uses the bitcoin network to fetch that bitcoin transaction using Electrum servers, reads the OP_RETURN data and decodes it to the server address and some additional info.

there is no "attack on btc blockchain" and has nothing to do with "electrum wallet" and there is no bitcoin being transferred using this malware either.

Thanks a lot for taking time to analyse this . I was concerned over this . So this means electrum is safe & windows needs to be made more secure .

██████ PLEASE CONTACT @btcrox on telegram FOR BITCOIN ACCELERATION██████
pooya87
Legendary
*
Offline Offline

Activity: 3444
Merit: 10555



View Profile
September 08, 2019, 07:49:37 AM
 #4

~
Thanks a lot for taking time to analyse this . I was concerned over this . So this means electrum is safe & windows needs to be made more secure .

no problem.
and essentially yes. the malware is just using bitcoin nodes that have the ElectrumX software installed to index their database to fetch the transaction. the wallet is not even involved, in other words they are using the protocol.
you have to keep your computer safe from the malware in first place which is said to initially be spread by "get paid to install" micojobs.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!