Remote

Microsoft warns of a new remote access Trojan targeting cryptocurrency wallets

According to ChainCatcher news reported by Cointelegraph, tech giant Microsoft has discovered a new type of Remote Access Trojan (RAT) that specifically targets 20 cryptocurrency wallet extensions in the Google Chrome browser to steal crypto assets.The Microsoft Incident Response team revealed in a blog post on March 17 that they first detected the malware named StilachiRAT last November. This software is capable of stealing credentials, digital wallet information, and clipboard data stored in the browser. Once deployed, attackers can use StilachiRAT to scan the configuration information of the 20 cryptocurrency wallet extensions to steal crypto wallet data, including wallets such as Coinbase Wallet, Trust Wallet, MetaMask, and OKX Wallet.Microsoft's analysis pointed out: "Research on the WWStartupCtrl64.dll module of StilachiRAT, which contains RAT functionality, indicates that it employs multiple methods to steal information from the target system." Among other features, the malware can extract credentials stored in the Google Chrome local state file and monitor clipboard activity to obtain sensitive information such as passwords and encryption keys. It also has detection evasion and anti-forensics capabilities, such as clearing event logs and checking if it is running in a sandbox to thwart analysis attempts.Currently, Microsoft has not been able to identify the perpetrators behind the malware but hopes to reduce the number of potential victims by publicly sharing information. Microsoft advises users to take measures to avoid becoming victims of the malware, including installing antivirus software, and cloud-based anti-phishing and anti-malware components on their devices.

Raydium: The attacker may have obtained the private keys through remote access to the server and will offer a bounty of 10% of the stolen amount to recover the funds

ChainCatcher news, the Solana ecosystem decentralized exchange Raydium has released an investigation report on the hacking incident. The report states that the Pool Owner account, which could extract liquidity pool funds, was initially deployed on a virtual machine with dedicated internal servers, and there is no evidence that the private key of the Pool Owner account was locally transmitted, shared, transferred, or stored outside of its initially deployed virtual machine. Preliminary suspicions suggest that the attacker may have remotely accessed the virtual machine or internal server where the account was deployed. The attack involved seven tokens: ETH, USDC, RAY, SOL, stSOL, UXP, and ZBC, with a total amount of approximately $4.4 million.Raydium stated that patches had previously been deployed to revoke the permissions of the attacked address and transfer the permissions to a cold wallet address. Additionally, unnecessary management parameters were removed yesterday at 18:27 Beijing time to prevent the liquidity pool from being affected. Raydium is currently determining the impact of the hacking incident on the liquidity pool and is also working with the Solana team, third-party auditors, and centralized exchanges to locate the attacker. They are willing to offer 10% of the stolen amount and the stolen RAY as a bounty in exchange for the return of the stolen funds. (Source link)
ChainCatcher Building the Web3 world with innovators