11-22-2024
BSV
$67.36
Vol 149.72m
-9.34%
BTC
$98827
Vol 110053.26m
0.86%
BCH
$489.42
Vol 1297.47m
-6.39%
LTC
$90.29
Vol 1128.77m
0.46%
DOGE
$0.38
Vol 10263.69m
2.13%
Getting your Trinity Audio player ready...

Internet security firm ESET has uncovered a web of digital currency malware that’s being distributed through trojanized applications disguised as popular digital currency wallets.

In a recent press release, the Slovak firm revealed that the sophisticated malicious digital currency scheme targeted mobile devices using both Android and iOS. The attackers distributed the malicious apps through fake websites, mimicking popular wallets including Coinbase, TokenPocket, OneKey, Trust Wallet, and Metamask. 

ESET first discovered the trojanized wallets in May 2021. The company described the campaign as a “sophisticated attack vector” as it involved an in-depth analysis of the legitimate applications in enabling the insertion of the malicious code in such a way that it would be extremely hard to detect for security professionals, while still making sure that the fake apps had the same functionality as the original apps.

ESET believes that the fake apps were the work of one cybercriminal group.

As the company further revealed, it had found several Telegram groups in which malicious copies of the legitimate wallets were being promoted. It believes that it was the criminal group behind the apps that started these groups to target a wider audience. Beginning in October 2021, these groups spread to Facebook, and later that year, they were even pushing their fake wallets on at least two legitimate Chinese websites.

The main goal behind the malicious apps is to steal victims’ digital assets, ESET says, adding that they have primarily targeted Chinese users.

Through a partnership it maintains with Google, ESET notified the search engine giant behind Android of the malicious apps, leading to the takedown of 13 apps that were believed to be compromised by the attackers.

“These malicious apps also represent another threat to victims, as some of them send secret victim seed phrases to the attackers’ server using an unsecured HTTP connection. This means that victims’ funds could be stolen not only by the operator of this scheme, but also by a different attacker eavesdropping on the same network,” Lukáš Štefanko, the ESET researcher who discovered the scheme, commented.

Watch: CoinGeek New York presentation, FYI: Better Information Tools for a More Lawful Blockchain Industry

Recommended for you

David Case gets technical with Bitcoin masterclass coding sessions
Whether you're a coding pro or a novice, David Case's livestream sessions on the X platform are not to be...
November 21, 2024
NY Supreme Court’s ruling saves BTC miner Greenidge from closing
However, the judge also ruled that Greenidge must reapply for the permit and that the Department of Environmental Conservation has...
November 20, 2024
Advertisement
Advertisement
Advertisement