BSV
$70.42
Vol 57.89m
-1.7%
BTC
$97489
Vol 42808.54m
0.58%
BCH
$526.22
Vol 531.87m
-1.59%
LTC
$106.33
Vol 1205.68m
3.63%
DOGE
$0.43
Vol 7610.1m
3.08%
Getting your Trinity Audio player ready...

Windows users beware. There’s a new threat making its way through email called ComboJack, and it’s stealing cryptocurrency.

It has been targeting computers in both Japan and the United States, making off with digital coins during transactions. The malware hides in the background, waiting for a user to send coins, at which time it steals the wallet address. Since the addresses are a long series of numbers and letters, most users simply copy and paste the address in transactions, which is when ComboJack puts itself to work.

The malware was first uncovered by researches with Palo Alto Networks (PAN). ComboJack is a variation of another crypto thief called CryptoJack. When the wallet address is copied, it is replaced with the address of the hacker’s wallet. Victims don’t realize what has happened and, according to the platform managing the transaction, the transfer appears completely legitimate.

ComboJack is the latest in a series of coin thieves. CryptoShuffler was the first instance of a wallet pickpocket last year, but it was centered only on legacy Bitcoin (BTC). ComboJack works to steal BTC, Ethereum, Monero, Litecoin, and a number of other digital assets. The easiest way to avoid an infection is to never open email attachments from untrusted sources.

PAN issued a report detailing how the malware is promulgated. A user will receive an email regarding a lost passport. The email is accompanied by an attachment containing the virus cloaked as a scanned passport in PDF. Once the PDF file is opened, users find only a single line of text requesting that he or she open an embedded document. That secondary document contains the remote code to infiltrate a Windows security flaw.

The remote code downloads a two-part file to the target machine. One part is a self-extracting executable, and the other contains password-protected components used in the creation and installation of ComboJack. A Windows tool built into the executable gives the thief system-level privileges, which it then uses to edit the computer’s registry to keep running in the background. At half-second intervals, ComboJack will check the Windows clipboard looking for a wallet address.

Hopefully by now most computer users know better than to open attachments from unknown or untrusted sources. If an email looks suspicious, it probably is, and should simply be deleted. Viruses attached to emails have been used since David L. Smith’s ‘Melissa’ virus in 1999 caused $1.2 billion in damages and losses, and are continuously more sophisticated. Remember, it’s highly unlikely that “Aunt Sally” is going to send pictures of her parasailing trip, especially if you don’t have an Aunt Sally.

Recommended for you

Russia proposes winter BTC mining ban until 2031
A commission led by Deputy Prime Minister Alexander Novak has proposed banning block reward mining in Siberia from November to...
November 28, 2024
BTC miner DMG Blockchain expands after $16M fundraising
The Canadian company has purchased Bitmain hydro miners for $5 million, which will be installed in February, bringing its total...
November 26, 2024
Advertisement
Advertisement
Advertisement