Darktrace Warns of 400% Surge in Crypto-Stealing Malware Scams

Generated by AI AgentCoin World
Friday, Jul 11, 2025 4:15 am ET1min read

Darktrace, a prominent cybersecurity firm, has issued a warning about a surge in social engineering scams that deploy crypto-stealing malware. These scams often masquerade as legitimate applications or software updates, tricking users into downloading malicious programs. Once the target downloads the malicious application, a

verification screen appears, during which the malware quietly collects system information. This tactic is particularly effective because it exploits the trust users place in well-known services like Cloudflare.

The scams are sophisticated, impersonating AI, gaming, and Web3 firms using spoofed social media accounts and project documentation hosted on legitimate platforms. Malware disguised as test software is stealing wallet data on both Mac and Windows, using stolen certificates and stealth tactics to evade detection. This malware is designed to steal cryptocurrency wallets, making it a significant threat to individuals and organizations involved in digital currency transactions.

Darktrace's AI-driven detection and Autonomous Response capabilities have been instrumental in identifying and mitigating these threats. The company's technology has detected anomalous behavior in various environments, including empty offices, where malicious activity was observed. This highlights the importance of continuous monitoring and the use of advanced AI tools to detect and respond to threats in real-time.

In one instance, Darktrace identified a cloud compromise on a customer’s Azure environment. The threat actor gained access after stealing access tokens and creating a rogue virtual machine (VM). The attacker modified a security rule to allow inbound SSH traffic from a specific IP range, ensuring persistent access to internal cloud resources. Darktrace's AI Analyst launched an autonomous investigation, correlating individual events into a broader account hijack incident.

Another incident involved a UK-based customer subscribed to Darktrace’s Managed Detection and Response (MDR) service. The threat actor leveraged compromised credentials to access several AWS instances within the customer’s Private Cloud environment. The attacker performed internal reconnaissance, staged the Rclone tool, and exfiltrated data using the Rclone utility. Darktrace's Autonomous Response capability intervened, blocking unusual external connectivity to the C2 server, effectively stopping the exfiltration of data.

These incidents underscore the need for continuous visibility, behavioral analysis, and machine-speed intervention across hybrid environments. Darktrace's AI-driven detection and Autonomous Response capabilities, combined with expert oversight from its Security Operations Center, provide defenders with the speed and clarity needed to contain threats and reduce operational disruption before the situation escalates. The company's proactive approach to cybersecurity is crucial in an era where social engineering scams and crypto-stealing malware pose significant risks to organizations worldwide.

Comments



Add a public comment...
No comments

No comments yet