Home CryptocurrencyGreedbier campaign steals $ 1m with 650 crypto attack tools

Greedbier campaign steals $ 1m with 650 crypto attack tools

by Hammad khalil
0 comments

A malicious campaign has created a network of more than $ 1 million in the stolen crypto using a triafacta of the types of attacks through browser extensions, websites and malware, websites and malware.

No Security Research Tuwal Adamoni said on Thursday that the malicious group, which the company termed “greedbier”, has redefined Crypto on the industrial-fame. “

“Most groups choose a lane – maybe they do browser extensions, or they focus on ransomware, or they run scam fishing sites – the greedyer said, ‘Why not all three? And it worked.

The types of the attackers undergrained by the greedbier have been used earlier, but the report states that cyber criminals are now deploying a range of complex scams to target Crypto users, which Edmin said that the scammers have stopped “Thinking Small.”

More than 150 fake crypto browser extensions

Adamoni said that 650 malicious devices have been stolen from cryptocurrency users, especially the crypto wall users, said Edmani said.

The group has published more than 150 malicious browser extracts for the Firefox browser marketplace, each of which is designed to transplant popular crypto walls such as Metamasask, Tronlink, Exodus and RBBY Wallet.

The malicious actor uses a “extension halling” technique, making a valid extension to bypass the first marketplace checks, later make them malicious.

Adamoni explained that the malicious existence director wallet credibility from the user input field within the fake wallet interface.

“This approach allows to bypass the safety of the market legitimately during the initial review process, then allows to install the weapons installed holidays that the ELDI has the truth and positive rating of the user.”

CEO of Cybercity firm Civers, Deddy Lavid told Cointelegraph that greedy campaign “shows how the cyber criminals are making weapons to trust users in browser browser extensions stores stores. Cleaning popular wallet plugins, flying reviews, and then self-credible-focused reviews.”

Malibly migrating wallet extensions. Source: No Security

In early July, no security identified 40 malicious firefox extensions, which is called the “Fox Wallet” campaign.

Crypto-theme malware

The other hand of the group’s attacks focuses on crypto-theme malware, some of which highlighted about 500 samples.

Like Lummasteller, credential stels specifically target the information of crypto wallets, while ransomware variants such as luka steeler are designed for Demandan Crypto payment.

Most malware are distributed through Russian websites

A network of scam websites

Trifecta has a network of fake websites presented as a thunder attack vector, crypto-relief products and services.

“These are not specific phishing pages that mimic the login portal – intended, they appear as a sleek, fake product landing page, advertising digital wallets, hardware devices, or wallet repair services,” said.

Connected: North Korean hackers target crypto projects with unusual Mac exploitation

He said that a server acts as a central center for command-control, credential collections, ransomware coordination and scam websites, “allows the attackers to streamline operations in many channels.”

A single IP address controls the campaign. Source: No Security

The campaign also shows signs of AI-based code, which enable rapid scaling and disconnections of crypto-torting attacks, representing a new development in the crypto-focused cybercrime.

“This is not a passing trend – this is new to normal,” Edmani warned.

“These attacks take advantage of the user’s expectations and bypass the stable rescue by directly injected into the wallet UIS,” Lavid said before adding, “Browser vendors, developer transparency and user vigilance.”

magazine: The Philippines blocks Big Crypto exchanges, the Stash of the Coinbase Scammer: Asia Express