malware

The North Korean hacker group Lazarus has implanted malware for stealing cryptocurrency in a new batch of JavaScript packages

ChainCatcher news, according to Decrypt, the Socket research team has discovered in a new attack that the North Korean hacker group Lazarus is associated with six new malicious npm packages that attempt to deploy backdoors to steal user credentials.Additionally, this malware can extract cryptocurrency data and steal sensitive information from Solana and Exodus crypto wallets. The attacks primarily target files from Google Chrome, Brave, and Firefox browsers, as well as keychain data on macOS, specifically tricking developers into inadvertently installing these malicious packages.The six discovered malicious packages include: is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator. They lure developers into installation through "typosquatting" (exploiting misspelled names). The APT group has created and maintained GitHub repositories for five of these packages, disguising them as legitimate open-source projects, increasing the risk of developers using the malicious code. These packages have been downloaded over 330 times. Currently, the Socket team has requested the removal of these packages and reported the related GitHub repositories and user accounts.Lazarus is a notorious North Korean hacker group, linked to the recent $1.4 billion Bybit hack, the $41 million Stake hack, the $27 million CoinEx hack, and countless other attacks in the crypto industry.

Security Company: Hackers are using fake GitHub projects to steal cryptocurrency, advising users to carefully check third-party code behavior before downloading

ChainCatcher news, according to Cointelegraph, cybersecurity company Kaspersky recently released research showing that hackers are creating hundreds of fake projects on the GitHub platform to lure users into downloading malware that steals cryptocurrency and credentials. Kaspersky has named this malware activity "GitVenom."Kaspersky analyst Georgy Kucherin pointed out in a report on February 24 that these fake projects include Telegram bots for managing Bitcoin wallets and tools for automating Instagram account interactions. Hackers carefully design project documentation, possibly using AI tools to generate content, and artificially increase the number of project "commits" to make the projects appear to be actively developed.According to Kaspersky's investigation, these malicious projects can be traced back at least two years. Regardless of how the projects are presented, they contain malicious components, such as information-stealing tools that upload saved credentials, cryptocurrency wallet data, and browsing history through Telegram, as well as clipboard hijackers that replace cryptocurrency wallet addresses. In November 2023, a user lost 5 Bitcoins (approximately $442,000) as a result. Kaspersky advises users to carefully check the behavior of third-party code before downloading.

Scam Sniffer: Please be aware of a new Telegram scam method where fake crypto KOLs spread malware

ChainCatcher news, Scam Sniffer has issued a security warning, revealing a new type of composite scam targeting cryptocurrency users. This scam has two main attack paths: system infection and account hijacking. The scammers first disguise themselves as well-known cryptocurrency KOLs, commenting on legitimate posts to lure users into joining so-called "exclusive investment" Telegram groups. Once users join the group, they will immediately receive a verification request from a fake bot named OfficiaISafeguardBot. These verifications are usually set with very short time windows, creating a sense of urgency.On a technical level, the verification process injects malicious PowerShell code into the clipboard without the user's knowledge. Once executed, it will automatically download and run malware that can compromise system security. These malware have been flagged as malicious by VirusTotal and have recently caused multiple incidents of private key theft. Another attack method is to induce users to provide Telegram account-related information, including phone numbers, login verification codes, and two-step verification passwords, thereby gaining complete control over the user's Telegram account.Scam Sniffer offers the following security recommendations:Do not execute commands from unknown sourcesCarefully verify the authenticity of official channelsBe vigilant about any verification requests with time pressureUse hardware wallets to store cryptocurrency assetsAvoid running arbitrary code and installing unknown softwareNever share Telegram verification codes and two-step verification passwords
ChainCatcher Building the Web3 world with innovators