Cryptocurrency Users Targeted by Malware Exploiting Google Chrome

Generated by AI AgentCoin World
Friday, Mar 21, 2025 12:44 am ET1min read

A new strain of malware has been identified, specifically targeting cryptocurrency users by exploiting vulnerabilities in

Chrome. This malware is designed to bypass Chrome's encryption and monitor the clipboard, allowing it to steal wallet credentials and financial data. The malware intercepts and modifies clipboard contents, replacing legitimate cryptocurrency wallet addresses with those controlled by the attackers. This ensures that any funds sent by the victim are redirected to the attacker's wallet.

The malware campaign has been distributed through cracked versions of popular trading software, such as TradingView Premium. These fake versions, often found on various online platforms, are disguised as legitimate software but contain malicious code. Once downloaded, the malware unleashes its payload, which includes Lumma Stealer for Windows and Atomic Stealer (AMOS) for Mac. These stealers exfiltrate user data, including passwords and two-factor authentication information, to servers hosted in remote locations.

The attack on Mac users is particularly concerning, as scammers pose as customer service representatives to guide victims through disabling security protocols. This social engineering tactic allows the malware to bypass Mac's built-in security measures, making it easier for the attackers to steal personal credentials. The malware has been active since 2022 and has been evolving to target not only cryptocurrency wallets but also two-factor authentication browser extensions.

The discovery of this malware underscores the growing threat of cybercrime in the cryptocurrency space. As the value of digital assets continues to rise, so does the incentive for attackers to develop more sophisticated methods of theft. This incident serves as a reminder for users to be vigilant and cautious when downloading software, especially from unofficial sources. It is crucial to verify the authenticity of any software before installation and to use reputable security tools to protect against such threats.

Comments



Add a public comment...
No comments

No comments yet