'Less sophisticated' malware is stealing millions: Chainalysis
Chainalysis warned that even “low-skilled cybercriminals” are using malware to swipe funds from crypto hodlers. Cryptojacking accounted for 73% of the total value received by malware related addresses between 2017 and 2021, according to a new malware report from blockchain analysis firm Chainalysis.Malware is used to conduct nefarious activity on a victim’s device such as a smartphone or PC after being downloaded without the victim’s knowledge. Malware-powered crime can be anything from information-stealing to denial-of-service (DDoS) attacks or ad fraud on a grand scale. The report....
Related News
Users have been warned against a new malware designed to steal crypto from browser extension wallets such as MetaMask and Coinbase Wallet. Security was never the strong suit of browser-based crypto wallets to store Bitcoin (BTC), Ether (ETH) and other cryptocurrencies. However, new malware makes the safety of online wallets even more complicated by directly targeting crypto wallets that work as browser extensions such as MetaMask, Binance Chain Wallet or Coinbase Wallet.Named Mars Stealer by its developers, the new malware is a powerful upgrade on the information-stealing Oski trojan of....
A trojan called CoinThief is stealing tens of thousands of dollars worth of BTC from unsuspecting Mac users. Contrary to popular belief, Macs do in fact get viruses. It's just that 91% of the world uses Windows while only 7% of the world uses OSX (The remaining percentage uses Linux). As such, virus makers have more incentive to create malware for Windows, because it simply makes sense to target the majority of computer users. This is generally great news for Mac users, since they remain virtually virus free. However, it can make them pretty complacent about security, and when a Mac virus....
In an article published on MIT Technology Review, legendary cryptography expert Bruce Schneier warns that antivirus companies have tracked for years a recently uncovered, very powerful and sophisticated malware, but chose not to disclose their findings. Why? Because there are indications that the malware is developed and operated by a government - the United States government. Schneier is an American cryptographer, computer security and privacy specialist, and writer. He is the author of several books on general security topics, computer security and cryptography. One of the most....
Computer security firm Dell SecureWorks has managed to identify 146 types of bitcoin malware in the wild. The company's researchers found the distinct breeds of malware had been specifically designed to steal bitcoins - a number of them presenting quite a danger to owners with coins stored either online or on their computers. The firm concluded that the number of Windows-compatible cryptocurrency stealing malware (CCSM) strains has gone up in line with bitcoin's increase in value. The total of 146 strains is up from 45 a year ago, and 13 two years ago, the researchers say. The biggest....
The recent hacking and defacing of the blog and Twitter account of Mt. Gox CEO Mark Karpeles, and the leaking of a 716 Mb archive file that allegedly contained trade data, database dumps, personal information about Karpeles, and an app for remotely accessing Mt. Gox data, has apparently been a clever ruse to make users download Bitcoin-stealing malware. According to Kaspersky Lab expert Sergey Lozhkin, the file does contain (publicly available) data related to Mt. Gox trades, but also a Windows and a Mac Trojan.