OFT

Microsoft warns of a new remote access Trojan targeting cryptocurrency wallets

According to ChainCatcher news reported by Cointelegraph, tech giant Microsoft has discovered a new type of Remote Access Trojan (RAT) that specifically targets 20 cryptocurrency wallet extensions in the Google Chrome browser to steal crypto assets.The Microsoft Incident Response team revealed in a blog post on March 17 that they first detected the malware named StilachiRAT last November. This software is capable of stealing credentials, digital wallet information, and clipboard data stored in the browser. Once deployed, attackers can use StilachiRAT to scan the configuration information of the 20 cryptocurrency wallet extensions to steal crypto wallet data, including wallets such as Coinbase Wallet, Trust Wallet, MetaMask, and OKX Wallet.Microsoft's analysis pointed out: "Research on the WWStartupCtrl64.dll module of StilachiRAT, which contains RAT functionality, indicates that it employs multiple methods to steal information from the target system." Among other features, the malware can extract credentials stored in the Google Chrome local state file and monitor clipboard activity to obtain sensitive information such as passwords and encryption keys. It also has detection evasion and anti-forensics capabilities, such as clearing event logs and checking if it is running in a sandbox to thwart analysis attempts.Currently, Microsoft has not been able to identify the perpetrators behind the malware but hopes to reduce the number of potential victims by publicly sharing information. Microsoft advises users to take measures to avoid becoming victims of the malware, including installing antivirus software, and cloud-based anti-phishing and anti-malware components on their devices.

Binance responds to "hackers stealing coins through red envelopes": Initial suspicion is that the user's device may have had malicious plugins/software installed, and it is advised to report to the police

ChainCatcher message, Binance responded to "hackers stealing coins through red envelopes" stating: "Based on the current investigation results and the information at hand, we initially suspect that the user's device may have had malicious plugins/software installed, which led to the user's email, Google Authenticator, Binance account, and other account information being sequentially stolen by hackers. The hackers simulated the user's common device and IP environment based on this, successfully passing the verification steps during the red envelope initiation process, ultimately resulting in the theft of funds.It should be noted that when users send red envelopes for payment on the Binance platform, they need to verify their payment PIN/fingerprint or Face ID/authenticator app/email. Therefore, the reason for the theft of the user's account assets through the red envelope function is due to the aforementioned personal information being stolen. It is strongly recommended that the user report this incident to the police. The Binance security risk control team will assist in providing all the information we have and, with the user's cooperation, further investigate their device to jointly identify the final cause. We also remind all users to remain vigilant, enhance their security awareness, and ensure they use secure and clean devices. Be cautious of the security risks to accounts and devices to protect personal asset safety.
ChainCatcher Building the Web3 world with innovators