BSV
$47.31
Vol 13.23m
2.82%
BTC
$60109
Vol 38128.66m
3.45%
BCH
$314.01
Vol 188.92m
0.63%
LTC
$63.32
Vol 306.03m
1.14%
DOGE
$0.1
Vol 497.06m
1.78%

American cybersecurity software firm McAfee has discovered a new malware that steals private keys from images held in Android devices.

Dubbed SpyAgent, the malware can recognize private keys from images, including screenshots, using optical character recognition (OCR), a process that enables computer systems to convert an image of text into a machine-readable text format.

According to McAfee, the malware spreads through the usual social engineering techniques, such as sending links to unsuspecting users through text messages. Clicking on the links redirects the users to websites that claim to contain legitimate software, which, when installed, activates the malware.

The victims end up permitting these applications to access their messages, images and contacts, and they set out to look for any ‘crypto-related’ information, starting with private keys.

“Upon examining the page, it became clear that a primary goal of the attackers was to obtain the mnemonic recovery phrases for cryptocurrency wallets. This suggests a major emphasis on gaining entry to and possibly depleting the crypto assets of victims,” the security firm notes.

McAfee says SpyAgent has been active since January; the company has identified 280 fake applications used to spread the malware, with South Koreans being the primary target.

SpyAgent is one of hundreds of malware targeting digital asset users, which have intensified this year. A Chainalysis report in August found that while overall illicit activity had declined in the first seven months of the year, stolen funds and malware had shot up. The latter had increased to $460 million while stolen fund inflows had doubled to $1.58 billion.

“2024 is set to be the highest-grossing year yet for ransomware payments, due in no small part to strains carrying out fewer high-profile attacks but collecting large payments (known in the industry as “big game hunting”),” the New York blockchain analytics company revealed.

Malware attacks are targeting larger businesses, Chainalysis found. The result is a spike in the median ransom payment to $1.5 million, up from $200,000 in 2023.

A week ago, the United States Federal Bureau of Investigation (FBI) warned that North Korean hackers have stepped up their game and are now targeting digital asset owners more aggressively than ever.

“North Korean social engineering schemes are complex and elaborate, often compromising victims with sophisticated technical acumen. Given the scale and persistence of this malicious activity, even those well versed in cybersecurity practices can be vulnerable,” the agency said.

Watch: Cybersecurity fundamentals in today’s digital age with AI & Web3

Recommended for you

Blockchain enables autonomous AI agents to learn
Utilizing blockchain tech, a group of Belgian scientists enabled autonomous AI agents to learn and communicate securely, contributing to the...
September 17, 2024
WhatsOnChain gets own UTXO endpoints for BSV blockchain services
With ElectrumX set to retire in October, WhatsOnChain is gearing up to implement a new UTXO set of API endpoints,...
September 16, 2024
Advertisement
Advertisement
Advertisement