Binance Square

Malwareattack

25,232 views
11 Discussing
irathen
--
Hello everyone. I want to address an issue that I haven't seen anyone online even mention. And that is the USTC Miner. Now, I am not sure if this a scam or not, but judging off of their page it could pose as malware who are trying to leech off of people for their money whilst advertising itself as a miner. Basically, the way it works is you get into that website through a referral and then with a SINGLE click it mines for you. You can transfer USTC to USDT and make an insane amount of money. The website itself doesn't explain a lot on how they actually profit or even work, as USTC, USDT and USDC is directly linked to the US Dollar. Ergo, this lead me to believe that this specific miner IS malware. But I would like to hear from some of you who have used it before to maybe explain more, as I haven't really delved too deep into it. #ustcwarning #Malwareattack
Hello everyone.
I want to address an issue that I haven't seen anyone online even mention.
And that is the USTC Miner.
Now, I am not sure if this a scam or not, but judging off of their page it could pose as malware who are trying to leech off of people for their money whilst advertising itself as a miner.
Basically, the way it works is you get into that website through a referral and then with a SINGLE click it mines for you. You can transfer USTC to USDT and make an insane amount of money.

The website itself doesn't explain a lot on how they actually profit or even work, as USTC, USDT and USDC is directly linked to the US Dollar.

Ergo, this lead me to believe that this specific miner IS malware.

But I would like to hear from some of you who have used it before to maybe explain more, as I haven't really delved too deep into it.

#ustcwarning #Malwareattack
BEWARE! Crocodilus Malware Targets Your Android Crypto Wallet! A new malware called Crocodilus is lurking on Android users, especially those who store crypto assets in digital wallets. This malware disguises itself as a legitimate application and uses overlay techniques to steal your seed phrase. How Crocodilus works: Posing as a legitimate app and requesting accessibility service access. Displays a fake overlay asking you to enter a seed phrase for security reasons. Once it gains access, malware can remotely take over your device and steal sensitive data. Tips to protect yourself: Avoid downloading apps from unofficial sources. Never enter your seed phrase into any suspicious app. Check app permissions regularly and revoke unnecessary access. Use a trusted security app to scan your device. Don't let your crypto assets be stolen by this dangerous malware! #CryptoNews #Malwareattack
BEWARE! Crocodilus Malware Targets Your Android Crypto Wallet!

A new malware called Crocodilus is lurking on Android users, especially those who store crypto assets in digital wallets.

This malware disguises itself as a legitimate application and uses overlay techniques to steal your seed phrase.

How Crocodilus works:

Posing as a legitimate app and requesting accessibility service access.

Displays a fake overlay asking you to enter a seed phrase for security reasons.

Once it gains access, malware can remotely take over your device and steal sensitive data.

Tips to protect yourself:

Avoid downloading apps from unofficial sources.

Never enter your seed phrase into any suspicious app.

Check app permissions regularly and revoke unnecessary access.

Use a trusted security app to scan your device.

Don't let your crypto assets be stolen by this dangerous malware!

#CryptoNews #Malwareattack
See original
The theft of cryptocurrencies has increased as hackers sell fake phones equipped with malware Kaspersky Cybersecurity has revealed that hackers are using malicious software installed on Android devices to steal cryptocurrencies. The company advised users to exercise caution. As the world of cryptocurrencies evolves, hackers are innovating new ways to steal users' digital assets. Kaspersky Lab experts revealed that hackers are using fake Android smartphones to steal cryptocurrencies. According to Kaspersky Cybersecurity, thousands of infected Android devices have been discovered, specifically developed to steal user data and cryptocurrencies. These devices are often sold at low prices to attract buyers. The latest malware is a modified version of Triada, a Trojan remote access malware used to compromise Android devices. Security companies reported finding over 2,600 users affected by the new version of Triada. These users belong to various regions around the world, but the majority are from Russia. #russia #HackerAlert #hackers #Malwareattack #kaspersky
The theft of cryptocurrencies has increased as hackers sell fake phones equipped with malware

Kaspersky Cybersecurity has revealed that hackers are using malicious software installed on Android devices to steal cryptocurrencies.
The company advised users to exercise caution.
As the world of cryptocurrencies evolves, hackers are innovating new ways to steal users' digital assets. Kaspersky Lab experts revealed that hackers are using fake Android smartphones to steal cryptocurrencies.

According to Kaspersky Cybersecurity, thousands of infected Android devices have been discovered, specifically developed to steal user data and cryptocurrencies. These devices are often sold at low prices to attract buyers.

The latest malware is a modified version of Triada, a Trojan remote access malware used to compromise Android devices. Security companies reported finding over 2,600 users affected by the new version of Triada. These users belong to various regions around the world, but the majority are from Russia.
#russia #HackerAlert #hackers #Malwareattack
#kaspersky
See original
The "Lazarus" group turns into a Bitcoin whale, owning Bitcoin worth 1 billion dollars: details The “Lazarus” group, responsible for the recent $1.5 billion hack of “Bybit,” has become one of the largest Bitcoin whales, after acquiring 13,518 Bitcoin worth $1.13 billion, according to “Arkham Intelligence.” These holdings make North Korea the fifth largest country in terms of Bitcoin ownership after the United States, China, the United Kingdom, and Ukraine, surpassing the holdings of Bhutan (13,029 Bitcoin) and El Salvador (6,089 Bitcoin). Additionally, the “Lazarus” wallets contain 13,702 Ethereum ($26 million), 5,022 BNB ($3 million), and $2.2 million in DAI, along with other stablecoins. “CertiK” also reported that the group deposited 400 Ethereum ($750,000) into the “Tornado Cash” mixing service. In another context, “Socket” revealed that Lazarus has deployed new malware targeting cryptocurrency wallets, such as Solana and Exodus, through fake JavaScript libraries to steal credentials. In a related development, OKX suspended its decentralized Web3 DEX platform after discovering Lazarus's attempt to exploit decentralized finance (DeFi) services. Bloomberg reported that the collective was used to launder $100 million in cryptocurrencies associated with the group. #bybit #WhaleManipulation #JavaScript #Malwareattack #LazarusGroup $ETH
The "Lazarus" group turns into a Bitcoin whale, owning Bitcoin worth 1 billion dollars: details
The “Lazarus” group, responsible for the recent $1.5 billion hack of “Bybit,” has become one of the largest Bitcoin whales, after acquiring 13,518 Bitcoin worth $1.13 billion, according to “Arkham Intelligence.”

These holdings make North Korea the fifth largest country in terms of Bitcoin ownership after the United States, China, the United Kingdom, and Ukraine, surpassing the holdings of Bhutan (13,029 Bitcoin) and El Salvador (6,089 Bitcoin).

Additionally, the “Lazarus” wallets contain 13,702 Ethereum ($26 million), 5,022 BNB ($3 million), and $2.2 million in DAI, along with other stablecoins.

“CertiK” also reported that the group deposited 400 Ethereum ($750,000) into the “Tornado Cash” mixing service.

In another context, “Socket” revealed that Lazarus has deployed new malware targeting cryptocurrency wallets, such as Solana and Exodus, through fake JavaScript libraries to steal credentials.

In a related development, OKX suspended its decentralized Web3 DEX platform after discovering Lazarus's attempt to exploit decentralized finance (DeFi) services.

Bloomberg reported that the collective was used to launder $100 million in cryptocurrencies associated with the group.
#bybit
#WhaleManipulation #JavaScript #Malwareattack
#LazarusGroup
$ETH
The On Trader
--
**New cryptocurrency-stealing malware "MassJacker" targets cryptocurrency transactions**
According to a report from Cointelegraph, a new type of cryptocurrency-stealing malware known as MassJacker has emerged, targeting users who download pirated software and hijacking cryptocurrency transactions by replacing stored addresses. This malware originates from the pesktop[dot]com website, where unwary users could inadvertently infect their devices. Once installed, MassJacker replaces cryptocurrency addresses stored in the wallet app with addresses controlled by the attacker.
--
Bullish
See original
⚠️ It has been reported that data from over 100,000 users of the Gemini platform and possibly Binance has been sold on the dark web, including full names, email addresses, phone numbers, and geographical locations 😯 For its part, Binance confirmed that this breach did not occur from its platform, but may have resulted from malware on users' devices. #scam #scamriskwarning #Malwareattack #Binance #bitcoin $BTC {future}(BTCUSDT)
⚠️ It has been reported that data from over 100,000 users of the Gemini platform and possibly Binance has been sold on the dark web, including full names, email addresses, phone numbers, and geographical locations 😯

For its part, Binance confirmed that this breach did not occur from its platform, but may have resulted from malware on users' devices.

#scam #scamriskwarning #Malwareattack #Binance #bitcoin
$BTC
A new crypto-stealing malware is targeting iPhones and Android smartphones#Alert🔴 #Malwareattack A new cybersecurity threat is targeting users of both Android and iOS devices. According to a Kaspersky report, a malicious software development kit (SDK) has been spotted embedded in several apps available on Google Play and the Apple App Store. This SDK, dubbed SparkCat, is designed to steal cryptocurrency wallet recovery phrases using optical character recognition (OCR) technology. The campaign has already affected hundreds of thousands of users, with over 242,000 downloads recorded on the Google Play Store alone. The malicious SDK operates differently on Android and iOS devices. On Android, it uses a Java component called Spark, which serves as an analytics module. This component retrieves encrypted configuration files from GitLab, which contain commands and updates for the malware. On iOS, the framework goes by various names, such as Gzip, googleappsdk, or stat, and uses a Rust-based networking module called im_net_sys to communicate with C2 servers. The primary function of this malware is to scan images on a user’s device for cryptocurrency wallet recovery phrases. These phrases, often stored as screenshots or photos, are used to restore access to cryptocurrency wallets. The malware uses Google ML Kit OCR to extract text from images, targeting specific keywords in multiple languages, including Latin, Korean, Chinese, and Japanese. Once it identifies a recovery phrase, the stolen data is sent to the attackers’ servers, allowing them to access the victim’s cryptocurrency funds without needing a password. Kaspersky’s investigation revealed that the malware is region-specific, with different keywords and targeting strategies for areas like Europe and Asia. However, the researchers caution that the apps could still function outside their intended regions, posing a risk to a broader audience. So far, 18 Android apps and 10 iOS apps have been identified as infected. You can find the list of affected apps in Kaspersky's report here. One notable example is the Android app — ChatAi — which had been downloaded more than 50,000 times before being removed from the Google Play Store. However, many of the other infected apps remain available on both platforms, which is still a matter of concern. If you suspect you’ve installed any of the malware-infected apps, you must uninstall them immediately. According to experts, it is also recommended to install a reputable mobile antivirus tool to scan your device for any lingering traces of the malware. In severe cases, a factory reset may be necessary to ensure complete removal. Self-hosted, offline password managers with vault features can also provide an additional layer of security. $BTC {spot}(BTCUSDT)

A new crypto-stealing malware is targeting iPhones and Android smartphones

#Alert🔴 #Malwareattack

A new cybersecurity threat is targeting users of both Android and iOS devices. According to a Kaspersky report, a malicious software development kit (SDK) has been spotted embedded in several apps available on Google Play and the Apple App Store. This SDK, dubbed SparkCat, is designed to steal cryptocurrency wallet recovery phrases using optical character recognition (OCR) technology. The campaign has already affected hundreds of thousands of users, with over 242,000 downloads recorded on the Google Play Store alone.
The malicious SDK operates differently on Android and iOS devices. On Android, it uses a Java component called Spark, which serves as an analytics module. This component retrieves encrypted configuration files from GitLab, which contain commands and updates for the malware. On iOS, the framework goes by various names, such as Gzip, googleappsdk, or stat, and uses a Rust-based networking module called im_net_sys to communicate with C2 servers.
The primary function of this malware is to scan images on a user’s device for cryptocurrency wallet recovery phrases. These phrases, often stored as screenshots or photos, are used to restore access to cryptocurrency wallets. The malware uses Google ML Kit OCR to extract text from images, targeting specific keywords in multiple languages, including Latin, Korean, Chinese, and Japanese. Once it identifies a recovery phrase, the stolen data is sent to the attackers’ servers, allowing them to access the victim’s cryptocurrency funds without needing a password.

Kaspersky’s investigation revealed that the malware is region-specific, with different keywords and targeting strategies for areas like Europe and Asia. However, the researchers caution that the apps could still function outside their intended regions, posing a risk to a broader audience.
So far, 18 Android apps and 10 iOS apps have been identified as infected. You can find the list of affected apps in Kaspersky's report here. One notable example is the Android app — ChatAi — which had been downloaded more than 50,000 times before being removed from the Google Play Store. However, many of the other infected apps remain available on both platforms, which is still a matter of concern.
If you suspect you’ve installed any of the malware-infected apps, you must uninstall them immediately. According to experts, it is also recommended to install a reputable mobile antivirus tool to scan your device for any lingering traces of the malware. In severe cases, a factory reset may be necessary to ensure complete removal. Self-hosted, offline password managers with vault features can also provide an additional layer of security.

$BTC
🐊 Crocodilus Dangerous Android Trojan Hunting Cryptocurrency🛃 Cybersecurity researchers at Threat Fabric have discovered a new family of mobile malware that can trick Android users into revealing their cryptocurrency wallet seed phrases. 📃 According to a report from March 28, the Crocodilus malware uses fake screens on top of legitimate apps and displays a warning about the need to back up your crypto wallet key within a certain period of time. 🗣️ “After the victim enters the app password, a message appears on the screen: ‘Back up your wallet key in Settings within 12 hours. Otherwise, the app will be reset and you may lose access to your wallet,’” Threat Fabric explains. 🧙This social engineering trick directs the user to the seed phrase section, which allows Crocodilus to collect this information via Android’s accessibility logger. Once the attackers obtain the seed phrase, they gain full control over the wallet and can “empty it completely.” 🐊 Crocodilus is a new malware that, according to experts, has all the features of modern hacking software, including attacks using screen overlays, advanced data collection through screen capture with sensitive information (such as passwords), and remote access to gain control over the infected device. ⚙️ The initial infection occurs when the malware is unintentionally downloaded as part of other software that bypasses Android 13 protection and other security mechanisms. 🛡️Once installed 🐊 Crocodilus requests that the accessibility service be enabled, which allows the hackers to access the device. “Once these rights are granted, the malware connects to the command and control (C2) server to receive instructions, including a list of target applications and screen overlays,” Threat Fabric notes. 🔐 The malware runs continuously, monitoring application launches and displaying overlays to intercept credentials. When the targeted banking or cryptocurrency app is opened, a fake screen is launched on top of it, and the hackers take control of the device. “With stolen personal data and credentials, attackers can take full control of the victim’s device using built-in remote access and secretly make fraudulent transactions,” the experts warn. #Malwareattack #SAFU🙏 #SecurityAlert #Crocodilus #Alert🔴

🐊 Crocodilus Dangerous Android Trojan Hunting Cryptocurrency

🛃 Cybersecurity researchers at Threat Fabric have discovered a new family of mobile malware that can trick Android users into revealing their cryptocurrency wallet seed phrases.
📃 According to a report from March 28, the Crocodilus malware uses fake screens on top of legitimate apps and displays a warning about the need to back up your crypto wallet key within a certain period of time.
🗣️ “After the victim enters the app password, a message appears on the screen: ‘Back up your wallet key in Settings within 12 hours. Otherwise, the app will be reset and you may lose access to your wallet,’” Threat Fabric explains.
🧙This social engineering trick directs the user to the seed phrase section, which allows Crocodilus to collect this information via Android’s accessibility logger. Once the attackers obtain the seed phrase, they gain full control over the wallet and can “empty it completely.”
🐊 Crocodilus is a new malware that, according to experts, has all the features of modern hacking software, including attacks using screen overlays, advanced data collection through screen capture with sensitive information (such as passwords), and remote access to gain control over the infected device.
⚙️ The initial infection occurs when the malware is unintentionally downloaded as part of other software that bypasses Android 13 protection and other security mechanisms.
🛡️Once installed 🐊 Crocodilus requests that the accessibility service be enabled, which allows the hackers to access the device.
“Once these rights are granted, the malware connects to the command and control (C2) server to receive instructions, including a list of target applications and screen overlays,” Threat Fabric notes.
🔐 The malware runs continuously, monitoring application launches and displaying overlays to intercept credentials. When the targeted banking or cryptocurrency app is opened, a fake screen is launched on top of it, and the hackers take control of the device.
“With stolen personal data and credentials, attackers can take full control of the victim’s device using built-in remote access and secretly make fraudulent transactions,” the experts warn.
#Malwareattack #SAFU🙏 #SecurityAlert #Crocodilus #Alert🔴
See original
*A new Android malware threatens crypto wallets 🚨* The security company ThreatFabric has discovered *Crocodilus*, an Android malware specifically targeting cryptocurrency wallets. This malicious software, disguised as legitimate applications related to crypto-assets, uses *social engineering* techniques to prompt users to save their recovery phrases (*seed phrases*). Once installed, *Crocodilus* exploits *Android's accessibility permissions* to: -Take remote control of the phone -Overlay fraudulent screens (*overlays*) -Steal sensitive data *Protect yourself*: always check the legitimacy of applications and avoid granting sensitive permissions without justification. #Binance #MarketPullback #TrendingTopic #Malwareattack $BTC $ETH $XRP
*A new Android malware threatens crypto wallets 🚨*

The security company ThreatFabric has discovered *Crocodilus*, an Android malware specifically targeting cryptocurrency wallets. This malicious software, disguised as legitimate applications related to crypto-assets, uses *social engineering* techniques to prompt users to save their recovery phrases (*seed phrases*).

Once installed, *Crocodilus* exploits *Android's accessibility permissions* to:
-Take remote control of the phone
-Overlay fraudulent screens (*overlays*)
-Steal sensitive data

*Protect yourself*: always check the legitimacy of applications and avoid granting sensitive permissions without justification.
#Binance
#MarketPullback
#TrendingTopic
#Malwareattack
$BTC
$ETH
$XRP
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number