Fake Bitcoin Wallet Swipes Seed Keys
According to the team behind the original wallet posted a document on Github explaining how to get rid of the impostor. It was obvious for a while that the duplicate wallet was malicious as it used the branding of the company without permission. In a further attempt to deceive users into downloading the malware cybercriminals registered the electrum.com domain to copy the original electrum.org. Developers have exposed a line of code from the fake wallet that appears to take the user’s seed key and upload it to the spurious domain. The seed keys are cryptographic keys that owners use to access different wallets via the app. Once compromised, the hackers can use these keys to empty crypto wallets of unsuspecting users that downloaded the wrong app.They have already analyzed MacOS and Windows binaries and found a high likelihood of other binaries being malicious also.“We previously warned users against ‘Electrum Pro’, but we did not have formal evidence at that time,”
Crypto Malware Mounting
Earlier this month is was revealed that a previously discovered Chrome extension that uses Facebook’s messenger service to inject malicious mining scripts had resurfaced in April. The FacexWorm hijacks CPU computing power to pilfer Monero in addition to spreading affiliate links for various crypto exchanges.
Image from Shutterstock