Darktrace warns of social engineering scams deploying crypto-stealing malware
2025-07-11 08:05:01
Main Idea
Scammers are impersonating AI, gaming, and Web3 startups on platforms like X, Telegram, and Discord to deceive users into providing sensitive information or cryptocurrency payments.
Key Points
1. Scammers pose as cryptocurrency payments in exchange for testing software to lure victims.
2. North Korean hackers target macOS, collecting verification details like CPU info, MAC address, and user ID to determine viable targets.
3. A second-stage payload is deployed if verification succeeds, often stealing wallet credentials, browser data, and encrypted Telegram files.
4. Groups like CrazyEvil create fake software companies using platforms like Twitter and Medium to target crypto-related communities.
5. Lazarus hacking group deployed malware strains like 'NimDoor' and 'OtterCookie' through fake interviews or malicious SDK updates.
Description
Researchers at cybersecurity company Darktrace have warned that threat actors are using increasingly sophisticated social engineering tactics to infect victims with crypto-stealing malware. In its latest blog, Darktrace researchers detailed an elaborate campaign in which scammers were found to be impersonating AI, gaming, and Web3 startups to trick users into downloading malicious software. The scheme relies on verified and compromised X accounts, as well as project documentation hosted on legit...
Latest News
- XLM crypto price impulsive rally: $0.42 resistance could trigger pullback2025-07-11 17:27:53
- Sei price jumps 22% to 5-month high, driven by USDC integration2025-07-11 16:57:53
- Tether to sunset USDT on Omni and others in tactical network purge2025-07-11 16:30:01
- PI forecast for 2025: Will Pi Network withstand the July token unlock?2025-07-11 15:49:27
- Opyn’s top minds defect to Coinbase in strategic shift toward onchain derivatives2025-07-11 15:19:55