Bitcoin Forum
May 12, 2024, 05:39:06 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [Warning]: Enigma Info stealer  (Read 72 times)
Dave1 (OP)
Hero Member
*****
Offline Offline

Activity: 1302
Merit: 522



View Profile
February 10, 2023, 08:52:00 AM
Last edit: November 18, 2023, 01:25:38 AM by Dave1
Merited by DdmrDdmr (4)
 #1

A new info stealer is being released by Russian threat actors in the wild that uses fake crypto related jobs offerings.

Here is the attack chain:



So they will send 2 files on the pretext that they are looking for someone and hire them.

a. Interview questions.txt
b. Interview conditions.word.exe - so this is the first attack as it contains the loader. So once it is installed on your machine, and it will download the second pay loader.

The 3rd and final stage is the Enigma Stealer

Quote
Enigma targets system information, tokens, and passwords stored in web browsers like Google Chrome, Microsoft Edge, Opera, and more. Additionally, it targets data stored in Microsoft Outlook, Telegram, Signal, OpenVPN, and other apps.

So if you received some emails, then do not open specially if you used your machine for your crypto activity as it might stole all your info like logins, passwords.

https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
If you want to be a moderator, report many posts with accuracy. You will be noticed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
cryptoaddictchie
Legendary
*
Offline Offline

Activity: 2072
Merit: 1315



View Profile
February 10, 2023, 09:41:37 AM
 #2

Thanks for warning us. Meaning even just by opening the file from the email it could start downloading already  and chance to steal your crypto from an app or software wallets?

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
348Judah
Hero Member
*****
Offline Offline

Activity: 714
Merit: 521



View Profile
February 10, 2023, 01:04:27 PM
 #3

If people can yield to the warnings and instructions always given from here that the device you use handling your wallet through should not be the one you use often for browsing or tht is connected to the internet, using a wallet like electrum should be on an airgapped device not connected to the internet to avoid any form of malicious attack that might be inteded on stealing our password or other login details or wallet keys.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
Lucius
Legendary
*
Offline Offline

Activity: 3234
Merit: 5676


Blackjack.fun🎲


View Profile WWW
February 10, 2023, 02:52:23 PM
 #4

Thanks for warning us. Meaning even just by opening the file from the email it could start downloading already  and chance to steal your crypto from an app or software wallets?

If you open the exe file and install that malicious program, then without any doubt you have infected your device and enabled the attacker to do the final stage, which consists of collecting all the important information you store on the computer and sending it to the hacker. Just opening any e-mail will not do any harm, although some e-mail providers/clients will not even allow sending exe files precisely to prevent the possibility of malicious attacks.

.
.BLACKJACK ♠ FUN.
█████████
██████████████
████████████
█████████████████
████████████████▄▄
░█████████████▀░▀▀
██████████████████
░██████████████
████████████████
░██████████████
████████████
███████████████░██
██████████
CRYPTO CASINO &
SPORTS BETTING
▄▄███████▄▄
▄███████████████▄
███████████████████
█████████████████████
███████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
███████████████████████
█████████████████████
███████████████████
▀███████████████▀
█████████
.
Woodie
Hero Member
*****
Offline Offline

Activity: 1806
Merit: 874


Rollbit.com ⚔️Crypto Futures


View Profile WWW
February 10, 2023, 04:10:52 PM
 #5

With how crafty people are becoming just to score some free coins, I think the best practice to protect our data and crypto coins is not to open any attachments from email addresses that are unfamiliar/unknown to us.
With techniques such as steganography, sometimes its not so obvious what's behind an attachment...


This reminds me, google drive seems to be another place these guys are really trying to explore by sending out messages that have these macros scripts that auto run once their link in the message is opened on a pc starts to copy out private keys and the alike...we really need t be careful out here in the digital space.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
rat03gopoh
Hero Member
*****
Offline Offline

Activity: 2086
Merit: 640


Your keys your responsibility


View Profile WWW
February 10, 2023, 04:38:46 PM
 #6

Thanks for warning us. Meaning even just by opening the file from the email it could start downloading already  and chance to steal your crypto from an app or software wallets?

Attacks don't happen automatically (app will be installed after download). Afaik, android also has a default setting to prevent app installation from outside the store. The attacker has to make every pretext in the first file sent with the .txt extension so that the victim disables security and installs the app, then the attack begins.

▓██   ██▓ ▒█████   █    ██  ██▀███      ██ ▄█▀▓█████▓██   ██▓  ██████   
 ▒██  ██▒▒██▒  ██▒ ██  ▓██▒▓██ ▒ ██▒    ██▄█▒ ▓█   ▀ ▒██  ██▒▒██    ▒   
  ▒██ ██░▒██░  ██▒▓██  ▒██░▓██ ░▄█ ▒   ▓███▄░ ▒███    ▒██ ██░░ ▓██▄     
  ░ ▐██▓░▒██   ██░▓▓█  ░██░▒██▀▀█▄     ▓██ █▄ ▒▓█  ▄  ░ ▐██▓░  ▒   ██▒ 
  ░ ██▒▓░░ ████▓▒░▒▒█████▓ ░██▓ ▒██▒   ▒██▒ █▄░▒████▒ ░ ██▒▓░▒██████▒▒ 
   ██▒▒▒ ░ ▒░▒░▒░ ░▒▓▒ ▒ ▒ ░ ▒▓ ░▒▓░   ▒ ▒▒ ▓▒░░ ▒░ ░  ██▒▒▒ ▒ ▒▓▒ ▒ ░ 
 ▓██ ░▒░   ░ ▒ ▒░ ░░▒░ ░ ░   ░▒ ░ ▒░   ░ ░▒ ▒░ ░ ░  ░▓██ ░▒░ ░ ░▒  ░ ░ 
 ▒ ▒ ░░  ░ ░ ░ ▒   ░░░ ░ ░   ░░   ░    ░ ░░ ░    ░   ▒ ▒ ░░  ░  ░  ░   
 ░ ░         ░ ░     ░        ░        ░  ░      ░  ░░ ░           ░   
 ░ ░                                                 ░ ░                 
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀▄▄██▀▀⠀▄▄▄⠀⠀▀▀█▄▄▄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀▄█▀▀⠀⠀⠀⠀⠀███⠀⠀⠀⠀⠀⠀⠀▐▀█▄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀▀⠀⠀⠀⠀⠀⠀⠀⠀▐████████████⠀⠀█⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀▄▄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀██████████████▄⠀⠀⠀⠀⠀⠀⠀⠀⠀▄⠀▄⠀⠀⠀⠀⠀
⠀⠀██▀⠀⠀⠀⠀⠀⠀▄▄▄⠀⠀⠀⠀⠀⠀▀█████████████⠀⠀⠀⠀⠀⠀⠀▐██████▄▄⠀⠀⠀
⠀⠀▐⠀⠀⠀⠀⠀⠀⠀⠀█▄██▄⠀⠀⠀⠀⠀⠀▀███████████⠀▄⠀⠀⠀⠀⠀⠀██⠀⠀⠀██▌⠀⠀
⠀⠀⠀⠀⠀⠀▄⠀⠀⠀⠀███▄▄▌⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀▀█▀⠀⠀█▌⠀⠀⠀⠀██▀▀██▀⠀⠀⠀
⠀⠀⠀⠀⠀█▌⠀⠀⠀▐▀███▀▄█▄▄▄▄▄▄▄▄▄▄⠀⠀⠀⠀⠀⠀▀█▌⠀⠀⠀⠀▄██▌⠀⠀▄██⠀⠀⠀
⠀⠀⠀⠀⠀█▌⠀⠀⠀⠀███⠀⠀██▀██▀██▀██▀████▄⠀⠀██⠀⠀⠀⠀⠀⠀█▀▀█▀▀▀⠀⠀⠀
⠀⠀⠀⠀▐██⠀⠀⠀⠀█▀⠀⠀⠀⠀▀⠀▀▀⠀▀▀⠀▀█⠀█▀█▀██⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀█▌⠀⠀⠀⠀`⠀⠀▄⠀▐██████▄▄⠀⠀▀▐▀██▀██⠀⠀⠀⠀⠀⠀⠀▄██▀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀▀█⠀⠀⠀⠀⠀⠀██⠀█⠀⠀▀██████▄▄⠀⠀█▀⠀▀⠀⠀⠀⠀⠀⠀███▀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀▄⠀⠀██⠀▄⠀⠀⠀`▀███⠀█⠀▀▀██████▄⠀⠀⠀██⠀⠀⠀▄███⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀█⠀⠀⠀▀⠀⠀▀▀▄▄⠀⠀▀████▀▄⠀▀██████▄▄▄█▄█████⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀▀▌⠀⠀⠀⠀⠀⠀⠀⠀▀▌⠀⠀⠀▐███▄█⠀▄⠀▀▀█████████▀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀█⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀█⠀⠀⠀⠀⠀██████▄▀⠀⠀▀▀▀▀▀⠀⠀▄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀▄⠀⠀⠀⠀⠀▌▀▀⠀⠀▄⠀⠀⠀⠀⠀⠀⠀▀█⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀▀▀███▀▀⠀⠀▐█⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
▓██   ██▓ ▒█████   █    ██  ██▀███      ██▀███  ▓█████   ██████  ██▓███   ▒█████   ███▄    █   ██████  ██▓ ▄▄▄▄    ██▓ ██▓     ██▓▄▄▄█████▓▓██   ██▓
 ▒██  ██▒▒██▒  ██▒ ██  ▓██▒▓██ ▒ ██▒   ▓██ ▒ ██▒▓█   ▀ ▒██    ▒ ▓██░  ██▒▒██▒  ██▒ ██ ▀█   █ ▒██    ▒ ▓██▒▓█████▄ ▓██▒▓██▒    ▓██▒▓  ██▒ ▓▒ ▒██  ██▒
  ▒██ ██░▒██░  ██▒▓██  ▒██░▓██ ░▄█ ▒   ▓██ ░▄█ ▒▒███   ░ ▓██▄   ▓██░ ██▓▒▒██░  ██▒▓██  ▀█ ██▒░ ▓██▄   ▒██▒▒██▒ ▄██▒██▒▒██░    ▒██▒▒ ▓██░ ▒░  ▒██ ██░
  ░ ▐██▓░▒██   ██░▓▓█  ░██░▒██▀▀█▄     ▒██▀▀█▄  ▒▓█  ▄   ▒   ██▒▒██▄█▓▒ ▒▒██   ██░▓██▒  ▐▌██▒  ▒   ██▒░██░▒██░█▀  ░██░▒██░    ░██░░ ▓██▓ ░   ░ ▐██▓░
  ░ ██▒▓░░ ████▓▒░▒▒█████▓ ░██▓ ▒██▒   ░██▓ ▒██▒░▒████▒▒██████▒▒▒██▒ ░  ░░ ████▓▒░▒██░   ▓██░▒██████▒▒░██░░▓█  ▀█▓░██░░██████▒░██░  ▒██▒ ░   ░ ██▒▓░
   ██▒▒▒ ░ ▒░▒░▒░ ░▒▓▒ ▒ ▒ ░ ▒▓ ░▒▓░   ░ ▒▓ ░▒▓░░░ ▒░ ░▒ ▒▓▒ ▒ ░▒▓▒░ ░  ░░ ▒░▒░▒░ ░ ▒░   ▒ ▒ ▒ ▒▓▒ ▒ ░░▓  ░▒▓███▀▒░▓  ░ ▒░▓  ░░▓    ▒ ░░      ██▒▒▒
 ▓██ ░▒░   ░ ▒ ▒░ ░░▒░ ░ ░   ░▒ ░ ▒░     ░▒ ░ ▒░ ░ ░  ░░ ░▒  ░ ░░▒ ░       ░ ▒ ▒░ ░ ░░   ░ ▒░░ ░▒  ░ ░ ▒ ░▒░▒   ░  ▒ ░░ ░ ▒  ░ ▒ ░    ░     ▓██ ░▒░
 ▒ ▒ ░░  ░ ░ ░ ▒   ░░░ ░ ░   ░░   ░      ░░   ░    ░   ░  ░  ░  ░░       ░ ░ ░ ▒     ░   ░ ░ ░  ░  ░   ▒ ░ ░    ░  ▒ ░  ░ ░    ▒ ░  ░       ▒ ▒ ░░
 ░ ░         ░ ░     ░        ░           ░        ░  ░      ░               ░ ░           ░       ░   ░   ░       ░      ░  ░ ░            ░ ░   
 ░ ░                                                                                                            ░                           ░ ░     
khaled0111
Legendary
*
Offline Offline

Activity: 2520
Merit: 2863


Top Crypto Casino


View Profile WWW
February 10, 2023, 11:04:23 PM
 #7

Attacks don't happen automatically (app will be installed after download). Afaik, android also has a default setting to prevent app installation from outside the store. The attacker has to make every pretext in the first file sent with the .txt extension so that the victim disables security and installs the app, then the attack begins.
That's correct, you need to execute the file by double clicking on it so it can download the payload. You need to be very cautious and check the extension of the file before opening it. In this example, it's supposed to be a word text file so it's supposed to end with .doc or .docx not .word.exe

█████████████████████████
████▐██▄█████████████████
████▐██████▄▄▄███████████
████▐████▄█████▄▄████████
████▐█████▀▀▀▀▀███▄██████
████▐███▀████████████████
████▐█████████▄█████▌████
████▐██▌█████▀██████▌████
████▐██████████▀████▌████
█████▀███▄█████▄███▀█████
███████▀█████████▀███████
██████████▀███▀██████████
█████████████████████████
.
BC.GAME
▄▄░░░▄▀▀▄████████
▄▄▄
██████████████
█████░░▄▄▄▄████████
▄▄▄▄▄▄▄▄▄██▄██████▄▄▄▄████
▄███▄█▄▄██████████▄████▄████
███████████████████████████▀███
▀████▄██▄██▄░░░░▄████████████
▀▀▀█████▄▄▄███████████▀██
███████████████████▀██
███████████████████▄██
▄███████████████████▄██
█████████████████████▀██
██████████████████████▄
.
..CASINO....SPORTS....RACING..
█░░░░░░█░░░░░░█
▀███▀░░▀███▀░░▀███▀
▀░▀░░░░▀░▀░░░░▀░▀
░░░░░░░░░░░░
▀██████████
░░░░░███░░░░
░░█░░░███▄█░░░
░░██▌░░███░▀░░██▌
░█░██░░███░░░█░██
░█▀▀▀█▌░███░░█▀▀▀█▌
▄█▄░░░██▄███▄█▄░░▄██▄
▄███▄
░░░░▀██▄▀


▄▄████▄▄
▄███▀▀███▄
██████████
▀███▄░▄██▀
▄▄████▄▄░▀█▀▄██▀▄▄████▄▄
▄███▀▀▀████▄▄██▀▄███▀▀███▄
███████▄▄▀▀████▄▄▀▀███████
▀███▄▄███▀░░░▀▀████▄▄▄███▀
▀▀████▀▀████████▀▀████▀▀
Saisher
Full Member
***
Offline Offline

Activity: 2310
Merit: 175


View Profile
February 10, 2023, 11:50:32 PM
 #8

Attacks don't happen automatically (app will be installed after download). Afaik, android also has a default setting to prevent app installation from outside the store. The attacker has to make every pretext in the first file sent with the .txt extension so that the victim disables security and installs the app, then the attack begins.
That's correct, you need to execute the file by double clicking on it so it can download the payload. You need to be very cautious and check the extension of the file before opening it. In this example, it's supposed to be a word text file so it's supposed to end with .doc or .docx not .word.exe


This is the reason why I create another email for communication I received a lot of emails with docs and pdf followed by .exe which is executable, I am educated enough to delete any emails with .exe attachments, they send these emails with very compelling titles on the headers.
The rule of thumb is never to entertain emails coming from an unknown source even if the title is very attractive to open, these hackers are good at marketing their malware, and always watch out for attachments with .exe on it.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!