AInvest Newsletter
Daily stocks & crypto headlines, free to your inbox
Crypto exchanges Binance and Kraken have successfully defended against a series of social-engineering attacks, similar to those that recently compromised
. These attacks aimed to breach user accounts and siphon cryptocurrency funds. The exchanges' security teams were able to detect and neutralize the threats before any significant damage occurred, showcasing the effectiveness of their security protocols.The attacks employed advanced phishing techniques, where hackers attempted to deceive users into revealing their login credentials and other sensitive information. By exploiting human vulnerabilities, the attackers sought to bypass the exchanges' robust security measures. However, Binance and Kraken's proactive monitoring and advanced security systems allowed them to identify and
these attempts, ensuring the safety of their users' assets.This incident highlights the ongoing struggle between crypto exchanges and cybercriminals, who are continually evolving their tactics to exploit weaknesses in security systems. The success of Binance and Kraken in thwarting these attacks underscores the importance of continuous investment in cybersecurity measures. As the value of cryptocurrencies continues to rise, so too does the incentive for hackers to target exchanges, making it crucial for platforms to stay ahead of potential threats.
The report also sheds light on the broader landscape of cyber threats, including the recent discovery of the Cthulhu Stealer malware, which targets
macOS users. This malware, written in GoLang, disguises itself as legitimate software and prompts users to enter their system and MetaMask passwords. Once the credentials are obtained, the malware steals a wide range of information, including cryptocurrency wallets, browser cookies, and system information. The stolen data is then sent to a command-and-control server, where it can be used for further malicious activities.The Cthulhu Stealer malware shares similarities with the Atomic Stealer infostealer, leading experts to speculate that it was created by the same developer. Both malware variants use the macOS command-line tool osascript to prompt users for passwords, indicating a common origin. The developers of Cthulhu Stealer, known as the Cthulhu Team, operate via Telegram and rent out their malware for a monthly fee. However, affiliates have reported issues with receiving payments, leading to the permanent ban of the developer from the marketplace.
The existence of malware targeting macOS users serves as a reminder that even systems considered secure are not immune to cyber threats. It is crucial for users to remain vigilant and exercise caution, particularly when installing software from unofficial sources. The increasing sophistication of cyber attacks underscores the need for continuous education and awareness about online security practices.

Quickly understand the history and background of various well-known coins

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025
Daily stocks & crypto headlines, free to your inbox
Comments
ο»Ώ
No comments yet