BSV
$68.37
Vol 164.17m
-11.12%
BTC
$99478
Vol 100184.2m
2.22%
BCH
$495.08
Vol 1536.74m
-6.35%
LTC
$90.15
Vol 1217.32m
0.28%
DOGE
$0.39
Vol 9947.02m
2.32%
Getting your Trinity Audio player ready...

Internet security firm ESET has uncovered a web of digital currency malware that’s being distributed through trojanized applications disguised as popular digital currency wallets.

In a recent press release, the Slovak firm revealed that the sophisticated malicious digital currency scheme targeted mobile devices using both Android and iOS. The attackers distributed the malicious apps through fake websites, mimicking popular wallets including Coinbase, TokenPocket, OneKey, Trust Wallet, and Metamask. 

ESET first discovered the trojanized wallets in May 2021. The company described the campaign as a “sophisticated attack vector” as it involved an in-depth analysis of the legitimate applications in enabling the insertion of the malicious code in such a way that it would be extremely hard to detect for security professionals, while still making sure that the fake apps had the same functionality as the original apps.

ESET believes that the fake apps were the work of one cybercriminal group.

As the company further revealed, it had found several Telegram groups in which malicious copies of the legitimate wallets were being promoted. It believes that it was the criminal group behind the apps that started these groups to target a wider audience. Beginning in October 2021, these groups spread to Facebook, and later that year, they were even pushing their fake wallets on at least two legitimate Chinese websites.

The main goal behind the malicious apps is to steal victims’ digital assets, ESET says, adding that they have primarily targeted Chinese users.

Through a partnership it maintains with Google, ESET notified the search engine giant behind Android of the malicious apps, leading to the takedown of 13 apps that were believed to be compromised by the attackers.

“These malicious apps also represent another threat to victims, as some of them send secret victim seed phrases to the attackers’ server using an unsecured HTTP connection. This means that victims’ funds could be stolen not only by the operator of this scheme, but also by a different attacker eavesdropping on the same network,” Lukáš Štefanko, the ESET researcher who discovered the scheme, commented.

Watch: CoinGeek New York presentation, FYI: Better Information Tools for a More Lawful Blockchain Industry

Recommended for you

Blockchain enables autonomous AI agents to learn
Utilizing blockchain tech, a group of Belgian scientists enabled autonomous AI agents to learn and communicate securely, contributing to the...
September 17, 2024
WhatsOnChain gets own UTXO endpoints for BSV blockchain services
With ElectrumX set to retire in October, WhatsOnChain is gearing up to implement a new UTXO set of API endpoints,...
September 16, 2024
Advertisement