Bitcoin burglars succeed in stealing 140,000 dollars of encrypted currency
2017-11-07 10:48 am | Resource: News Section | No Views : 829
Kaspersky Lab researchers discovered malicious software that stole encrypted currencies from a user's wallet by putting its address instead of the user's address in the device's folder.
The criminals succeeded with the governor of Bitcoin and managed to steal nearly 140,000 dollars.
The experts found new malicious software designed to steal Monroe through a process known as mining. There are actually samples available, and the encrypted (or virtual) currencies, with their ever-growing prosperity, quickly became an attractive target for cybercriminals around the world.
Kaspersky Lab researchers have seen an increase in the number of mining software, affecting thousands of computers and generating criminal revenues of hundreds of thousands of dollars. Experts also noted that criminals have begun using less advanced techniques and spend less time and spend less resources in this area.
According to the research, encrypted currency thieves, which have been increasing since 2014, have once again put their eyes on the savings of encrypted users in order to steal them.
Researchers at Kaspersky Lab discovered malicious software, CryptoShuffler, designed to change the addresses of encrypted user currency portfolios in the infected device folder, which is used to cache data.
It has known hijacking attacks for years, which direct users to malicious sites and target online payment systems.
However, cases involving a host address for coded currencies remain rare.
If a user wishes to transfer an encrypted currency to another user, in most encrypted currencies, it is necessary to know the identity number of the recipient's wallet, a unique number consisting of several digits. The following is how the CryptoShuffler software exploits the system's need for these numbers to function.
When installed, the CryptoShuffler software starts monitoring the device folder that the user uses when making an online payment by copying the ID number and pasting it into the destination address line in the application used to execute the payment transaction.
The trojan replaces the user's wallet with the one owned by the party behind the malicious software, so the user pasting the wallet ID number into the "destination address" line will place an address other than the address intended to send the money to. As a result, the victim transfers money directly to the criminals, unless the user is aware of the sudden switch, but this is not usually the case. Multi-digit numbers and wallet addresses on blockchain platforms are difficult to remember. It is therefore difficult to distinguish the occurrence of any change in the transaction line, even if it occurred before the user's eyes.
The substitution of the destination in the portfolio is instantaneous, thanks to the simple search for the addresses of the portfolio; the vast majority of the encrypted currency portfolios have a fixed position in the transaction line and do not use a certain number of cells, allowing the intruders to easily create regular symbols to replace them. Based on the research, CryptoShuffler works with a wide range of the most popular coded currencies, such as Betcuen Etherium, Zikash, Dash, Monero and others.
The most successful of the criminals behind the CryptoShuffler, so far, has been recorded in the attacks on the Governor of Betquin, based on observations from the Kaspersky Lab researchers. These criminals managed to steal 23 Petequin portfolios worth about $ 140,000, In other portfolios between a few dollars and several thousand dollars.
Sergey Yanakovsky, a malicious software analyst at Kaspersky Lab, said the encrypted currency "is no longer an elusive technique," adding that it enters into our daily lives and is actively spread around the world, becoming more popular among users and more attractive to criminals at the same time. : "We have recently noticed an increase in malicious attacks targeting different types of encrypted currencies, and we expect this trend to continue, so users who are considering investing in encrypted currencies should consider ensuring proper protection."
The experts also found a TrojanAkir target Monroe encoded currency called DiscordiaMiner, and was designed to download files and run a remote server. According to research, there are some similarities in performance between this malicious software and the NukeBot software, discovered earlier this year. As with NukeBot, source codes for malicious software were shared through hacking forums.
Users are encouraged to install robust security solutions that offer dedicated functionality to protect financial transactions, such as the Safe Money feature available in Kaspersky Lab solutions. This feature examines the vulnerabilities of hackers, constantly checking for specialized malware, protecting transactions from hacking with the help of Protected Browser technology, and protecting the clipboard that stores sensitive data during copy and paste operations.
Time frame Used - four hours The USDJPY is moving in a bullish direction in the near term. The USDJPY faced resistance and selling pressure nearly of the resistance level of 113.58 to retract to the support level 113.20. In view of the technical indicators Both the RSI and the Stochastic are indicating signs of recovery. Therefore, we expect that the USDJPY will test levels of 113.58 - 114.08 again…
- GBP/USD Technical analysis 13 December 2018 12:34 am2018-12-13
- EUR/USD Technical analysis 13 December 2018 12:32 am2018-12-13
- USD/JPY Technical analysis 12 December 2018 12:14 am2018-12-12
- GBP/USD Technical analysis 12 December 2018 12:12 am2018-12-12
- EUR/USD Technical analysis 12 December 2018 12:10 am2018-12-12
- USD/JPY Technical analysis 11 December 2018 05:22 am2018-12-11
- GBP/USD Technical analysis 11 December 2018 05:11 am2018-12-11
- EUR/USD Technical analysis 11 December 2018 04:52 am2018-12-11
- USD/JPY Technical analysis 10 December 2018 08:46 pm2018-12-09
Best trading brokers
- Euro zone manufacturing PMI widen in June, EUR /USD Slip’s 2017-07-03
- Bitcoin burglars succeed in stealing 140,000 dollars of encrypted currency 2017-11-07
- commodities Fundamental analysis aaab 2017-08-13
- Chairman Gaincarlo just made the most bullish statements in front of the Congress 2018-02-06
- job growth slowed by much more than anticipated in the month of March 2018-04-06
- Dogecoin .. Electronic currency arose as a result of irony 03:54 pm 2018-01-26
- Currency and commodity analysis for 2018 05:14 pm 2018-01-01
- Bitcoin forces Santa Claus to distribute the worst gifts to its investors on Christmas 10:04 am 2017-12-25
- Forex 09:26 am 2017-12-25
- OmiseGo .. Time for electronic financial exchanges 02:07 pm 2017-11-15