Security researchers are warning of the spread of malware via at least one site listing pirated software. The malware specializes in stealing crypto – and has already claimed a few victims.
Piracy increases the risk of Internet users who download illegally having their machines infected. This is regularly illustrated by the spread of malware via infected files. Cybersecurity researchers CyberArk researchers have just discovered a previously unknown Crypto Jacking software (specializing in the theft of cryptocurrencies) – in files hosted by illegal download sites.
The malware, dubbed MassJacker by the researchers, is believed to be connected to some 750,000 wallets, one of which, CyberArk explains, contains the equivalent of more than $300,000. The operation is incredibly simple. The malware detects crypto transactions – then replaces the data in the victim's wallet with the address of a controlled deposit by hackers.
Illegal download sites are a common vector for distributing malware.
Thus, it is the victim themselves who transfers funds to the malicious actors, without their knowledge. MassJacker doesn't stop there, as it downloads and executes three additional malicious programs. In particular, the Amadeus botnet, popular with hackers in recent years. As well as what appear to be two variants of the malware for different architectures.
Variants of this attack are likely to download other malware, including, for example, a Trojan that could give complete access to your computer. its sponsors. Of course, it cannot be emphasized that it is strongly recommended not to resort to illegal downloading. A recent antivirus with up-to-date definitions should detect this threat.
However, illegal download sites are popular with hackers – which tends to turn them into distribution vectors for recent threats that can sometimes go under the radar. More generally, it is rather advisable to avoid using blockchains on a computer used daily. In any case, hardware solutions like the Ledger key can help you make it harder to access your crypto.
These keys allow you to sign transactions without exposing them to malware that excels at cryptojacking.
0 Comments