<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>cybersecurity &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Mon, 26 Jan 2026 14:01:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Infostealer Data Breach: 149M Accounts Exposed &#8211; Critical Alert</title>
		<link>https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/</link>
					<comments>https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 14:01:22 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/</guid>

					<description><![CDATA[<p>Infostealer Data Breach: A Threat to Crypto Security A massive data breach involving infostealer malware has exposed approximately 149 million accounts, including those of cryptocurrency users. This breach highlights the increasing need for robust security measures in the crypto space. Uncovered Data: A Closer Look Cybersecurity expert Jeremiah Fowler uncovered the breach, revealing millions of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/">Infostealer Data Breach: 149M Accounts Exposed &#8211; Critical Alert</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Infostealer Data Breach: A Threat to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> Security</h1>
<p>A massive data breach involving infostealer malware has exposed approximately 149 million accounts, including those of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users. This breach highlights the increasing need for robust security measures in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space.</p>
<h2>Uncovered Data: A Closer Look</h2>
<p>Cybersecurity expert Jeremiah Fowler uncovered the breach, revealing millions of stolen credentials, including <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange Binance accounts. The exposed database contained login information for major platforms like Facebook, Instagram, and Netflix, with 420,000 credentials linked to Binance users.</p>
<h3>Understanding the Infostealer Threat</h3>
<p>Infostealer malware silently extracts login data from compromised devices. Unlike a direct breach of Binance&rsquo;s systems, this malware collects data from users&rsquo; devices, posing a significant risk to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets and online accounts. Binance emphasized that their internal systems were not compromised.</p>
<p>The breach included 48 million Gmail accounts, 17 million Facebook accounts, and 3.4 million Netflix accounts, among others. This incident underscores the global threat posed by credential-stealing malware, which can target financial services and government-linked domains.</p>
<h2>Preventive Measures for Users</h2>
<p>To combat the infostealer threat, users should employ antivirus software and conduct regular security scans. Binance advises users to use hardware-based multi-factor authentication (MFA) and maintain secure password practices to safeguard their accounts.</p>
<p>In response to such threats, Binance actively monitors dark web activities, alerts affected users, and initiates security measures like password resets.</p>
<h3>Infostealer Malware Escalates</h3>
<p>Originally reported by Kaspersky, this malware variant disguises itself as game cheats, targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets and browser extensions. It has attacked accounts on over 80 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchanges, including Coinbase and <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a>.com.</p>
<p>To mitigate risks, users should keep their software updated and be cautious about suspicious downloads, especially those related to gaming or <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> apps.</p>
<p>As <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> threats evolve, staying informed and proactive is crucial for safeguarding digital assets.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/">Infostealer Data Breach: 149M Accounts Exposed &#8211; Critical Alert</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2026/01/26/infostealer-data-breach-149m-crypto-security-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</title>
		<link>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/</link>
					<comments>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 04:01:03 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Stealka]]></category>
		<category><![CDATA[video game mods]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/</guid>

					<description><![CDATA[<p>Stealka crypto infostealer is making waves in the cyber world, primarily for its insidious tactic of infiltrating video game mods. The new malware, identified by cybersecurity firm Kaspersky, is designed to target crypto wallets and browser extensions. This article delves into the details of how Stealka is spreading through seemingly innocent game modifications and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/">Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer</strong> is making waves in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> world, primarily for its insidious tactic of infiltrating video game mods. The new malware, identified by cybersecurity firm Kaspersky, is designed to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets and browser extensions. This article delves into the details of how Stealka is spreading through seemingly innocent game modifications and what makes it particularly threatening.</p>
<h2>Understanding the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> Infostealer</h2>
<p>Unveiled by Kaspersky, the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer is a sophisticated piece of malware that specifically targets Microsoft Windows users. Disguised as game cheats and mods, this malware has been silently hijacking accounts, stealing cryptocurrencies, and installing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> miners on unsuspecting users&rsquo; computers since its discovery in November.</p>
<p>The malware&rsquo;s distribution channels include legitimate platforms like GitHub, SourceForge, and Google Sites. It&rsquo;s often cloaked as mods for popular games such as Roblox, or software cracks for applications like Microsoft Visio. Kaspersky researcher Artem Ushkov highlighted the use of artificial intelligence in creating deceptive websites that appear professional, further aiding in the spread of this malware.</p>
<h2>Targeted Data and Potential Risks</h2>
<p>The <strong>Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer</strong> is armed with an extensive arsenal of capabilities, making it a formidable threat. Its prime targets include data from browsers built on the Chromium and Gecko engines, putting over 100 browsers, including Chrome, Firefox, and Edge, at risk.</p>
<p>The malware focuses on extracting autofill data such as sign-in credentials, addresses, and payment card details. It also compromises the settings and databases of 115 browser extensions related to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets, password managers, and two-factor authentication services. Among the 80 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets at risk are popular options like Binance, Coinbase, and MetaMask.</p>
<p>Moreover, messaging apps like Discord and Telegram, email clients, password managers, and even VPN applications are vulnerable to this malware.</p>
<h2>Protecting Yourself from Stealka</h2>
<p>To safeguard against the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer, Kaspersky advises using reliable antivirus software and password managers, rather than storing passwords within browsers. Users should avoid pirated software and unofficial game mods, which are common carriers of this malware.</p>
<p>Cloudflare has reported alarming statistics, with over 5% of emails globally containing malicious content. A significant portion includes phishing links, and many HTML attachments are deemed malicious. These figures underscore the importance of vigilance in digital interactions.</p>
<p>In conclusion, the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer represents a growing threat in the digital landscape, particularly for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> enthusiasts. Staying informed and adopting robust security practices are essential steps in countering such <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> threats.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/">Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>North Korean Hackers&#8217; Amazing $15M USDT Theft Unveiled</title>
		<link>https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/</link>
					<comments>https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sat, 15 Nov 2025 23:01:06 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DOJ]]></category>
		<category><![CDATA[North Korean Hackers]]></category>
		<category><![CDATA[USDT theft]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/</guid>

					<description><![CDATA[<p>The North Korean hackers have once again made headlines with their audacious infiltration into U.S. companies, leading to a significant $15 million USDT theft. The U.S. Department of Justice (DOJ) has taken decisive action to recover these stolen funds and has secured guilty pleas from multiple individuals involved in this elaborate scheme. A Closer Look [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/">North Korean Hackers&#8217; Amazing $15M USDT Theft Unveiled</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <strong>North Korean hackers</strong> have once again made headlines with their audacious infiltration into U.S. companies, leading to a significant <em>$15 million <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a> theft</em>. The U.S. Department of Justice (DOJ) has taken decisive action to recover these stolen funds and has secured guilty pleas from multiple individuals involved in this elaborate scheme.</p>
<h2>A Closer Look at the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a> Theft</h2>
<p>In a move to safeguard the interests of affected companies, the DOJ has filed civil forfeiture complaints to reclaim $15.1 million in Tether&rsquo;s <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a>, which was illicitly obtained by <strong>North Korean hackers</strong> in 2023. These funds were traced back to Advanced Persistent Threat 38 (APT38), a notorious North Korean hacking group responsible for several high-profile <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> heists.</p>
<p>The funds were seized by the FBI in March 2025, and the DOJ is now seeking court approval to return the assets to their rightful owners. Although the specific incidents are not elaborated upon, the circumstantial evidence points to a series of hacks, including the $100 million theft from Poloniex in November 2023, the $37 million hack of CoinsPaid in July 2023, and the $60 million attack on Alphapo, among others.</p>
<h3>How U.S. Citizens Facilitated the Breach</h3>
<p>The DOJ revealed that four U.S. citizens and one Ukrainian national played a pivotal role in assisting <strong>North Korean hackers</strong>. These individuals, including Audricus Phagnasay, Jason Salazar, Alexander Paul Travis, and Erick Ntekereze Prince, admitted to wire fraud conspiracy. They provided their identities to the hackers and hosted company laptops at their residences, creating the illusion that these workers were based in the United States. Ukrainian national Oleksandr Didenko also pleaded guilty to similar charges.</p>
<p>These schemes allowed North Korean IT workers to fraudulently secure employment at over 136 U.S. companies, generating more than $2.2 million in revenue for North Korea. This operation resulted in the theft of identities from over 18 U.S. citizens, further highlighting the extensive reach of these cybercriminal activities.</p>
<h2>Implications and Ongoing Efforts</h2>
<p>The DOJ continues to trace and seize stolen virtual currencies as <strong>North Korean hackers</strong> persist in laundering funds through various channels like virtual currency bridges and exchanges. The regime&rsquo;s reliance on <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> theft, alongside remote IT worker schemes, represents a significant violation of international sanctions.</p>
<p>In 2025 alone, North Korean hackers have amassed over $2 billion in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a>, according to an analysis by Elliptic. This positions the regime as one of the most prolific players in global <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> theft operations.</p>
<p>The DOJ&rsquo;s actions underscore the ongoing threat posed by North Korean <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> activities and the critical importance of international cooperation to combat such threats effectively. As the digital landscape continues to evolve, robust security measures and vigilant monitoring remain essential to safeguarding against these sophisticated cybercrimes.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/">North Korean Hackers&#8217; Amazing $15M USDT Theft Unveiled</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/11/16/north-korean-hackers-usdt-theft-15m-insider-help/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</title>
		<link>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/</link>
					<comments>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 13:01:23 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/</guid>

					<description><![CDATA[<p>Apple vulnerability poses significant threats to cryptocurrency users, as the tech giant urges an immediate update of devices to patch a zero-click exploit. This critical flaw allows attackers to compromise iPhones, iPads, and Macs, posing heightened risks for those managing crypto assets. In a recent advisory, Apple disclosed that the image processing vulnerability has been [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/">Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Apple vulnerability</strong> poses significant threats to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users, as the tech giant urges an immediate update of devices to patch a <em>zero-click exploit</em>. This critical flaw allows attackers to compromise iPhones, iPads, and Macs, posing heightened risks for those managing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> assets.</p>
<p>In a recent advisory, Apple disclosed that the image processing vulnerability has been addressed in updates for macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2, and iPadOS 18.6.2. The tech company acknowledged that this vulnerability may have been exploited in sophisticated attacks against selected individuals.</p>
<h2>Understanding the Zero-Click Exploit</h2>
<p>Cybersecurity experts highlight the <strong>zero-click exploit</strong> as particularly dangerous for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> users. This vulnerability can be exploited without any user interaction, making it an attractive target for attackers aiming to access crypto-integrated systems. Such access could lead to financial losses through irreversible transactions.</p>
<p>Juliano Rizzo, CEO at cybersecurity firm Coinspect, explained that an attachment delivered via iMessage could be processed automatically, leading to a device compromise. Attackers could then access wallet data, posing a direct threat to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> holders.</p>
<h3>Apple Vulnerability Details</h3>
<p>The <strong>Apple vulnerability</strong> affects the Image I/O framework, crucial for reading and writing image file formats. Improper implementation allows attackers to write to out-of-bounds memory areas, potentially executing malicious code on targeted devices.</p>
<p>This vulnerability compromises device security by allowing unauthorized memory access. With device memory holding all active programs, attackers can alter these programs, executing their malicious instructions.</p>
<h3>Advice for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> Holders</h3>
<p>For high-value targets using vulnerable devices for key storage, Rizzo advises migrating to new wallet keys if there are signs of compromise or targeting. He emphasizes securing primary accounts like email and cloud services to prevent further exploitation.</p>
<p>&ldquo;While <em>patching</em> is critical, immediate account lockdown should not be delayed,&rdquo; Rizzo notes. He also mentions that system logs, though difficult to interpret, could theoretically reveal anomalies. However, Apple and similar vendors are best positioned to detect exploitation and inform victims directly.</p>
<p><a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> users must stay vigilant and implement security measures to protect their assets from such vulnerabilities. Regular updates and awareness of potential threats are crucial in maintaining the security of digital currencies.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/">Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</title>
		<link>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/</link>
					<comments>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 12:00:43 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Koi Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[wallet clones]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/</guid>

					<description><![CDATA[<p>In a recent report by cybersecurity company Koi Security, it was revealed that an ongoing malware campaign has been deploying more than 40 fraudulent extensions on the widely-used web browser, Mozilla Firefox. These extensions, masquerading as legitimate wallet tools like MetaMask, Coinbase, Trust Wallet, Phantom, Exodus, OKX, MyMonero, Bitget, among others, aim to pilfer cryptocurrency [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/">Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a recent report by cybersecurity company Koi Security, it was revealed that an ongoing malware campaign has been deploying more than 40 fraudulent extensions on the widely-used web browser, Mozilla Firefox. These extensions, masquerading as legitimate wallet tools like MetaMask, Coinbase, Trust Wallet, Phantom, Exodus, OKX, MyMonero, Bitget, among others, aim to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> credentials from unsuspecting users.</p>
<p>The malicious extensions, once installed, are programmed to steal user wallet credentials. &ldquo;We have connected over 40 different extensions to this active and live campaign,&rdquo; Koi Security stated.</p>
<p>The campaign, which has been running since at least April, uploaded the most recent extensions last week. These fraudulent extensions allegedly extract wallet credentials directly from the targeted sites and upload them to a remote server under the attacker&rsquo;s control.</p>
<p>The report also highlighted how the campaign uses ratings, reviews, branding, and functionality to win user trust by posing as genuine and thus boost installation rates. Some applications even boasted hundreds of fake five-star reviews.</p>
<p>The deceptive extensions used the same names and logos as the real services they were mimicking. In several cases, the threat actors cloned the official extensions&rsquo; open-source code and integrated their malicious code. This deceptive strategy maintained the expected user experience while minimizing the chances of immediate detection.</p>
<p>While Koi Security stated that &ldquo;attribution remains speculative,&rdquo; they pointed to &ldquo;multiple signals indicating a Russian-speaking threat actor.&rdquo; These signals include Russian language comments in the code and metadata found in a PDF file sourced from a malware command-and-control server associated with the incident. &ldquo;Although not definitive, these artifacts suggest that the campaign may be the work of a Russian-speaking threat actor group.&rdquo;</p>
<p>To minimize risk, Koi Security advised users to only install browser extensions from verified publishers and to manage extensions as full software assets, using allowlists and monitoring for unexpected behavior or updates.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/">Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Swissquote Pressured by Regulators to Combat Crypto Fraud and Impersonation Efforts</title>
		<link>https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/</link>
					<comments>https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 01 Jul 2025 20:00:55 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[Swissquote]]></category>
		<category><![CDATA[Yuh App]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/</guid>

					<description><![CDATA[<p>Swissquote, the digital trading platform that powers the crypto-accommodating Yuh app, has been instructed by Swiss regulatory bodies to crack down on phishing and impersonation efforts aimed at their platforms. An alarming number of over 600 deceptive websites, mimicking Swissquote platforms or attempting to defraud users via false login portals, were unearthed in the first [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/">Swissquote Pressured by Regulators to Combat Crypto Fraud and Impersonation Efforts</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Swissquote, the digital trading platform that powers the crypto-accommodating Yuh app, has been instructed by Swiss regulatory bodies to crack down on phishing and impersonation efforts aimed at their platforms. An alarming number of over 600 deceptive websites, mimicking Swissquote platforms or attempting to defraud users via false login portals, were unearthed in the first half of 2025, as reported by Bloomberg.</p>
<p>The Swiss Financial Market Supervisory Authority (FINMA) identified the Yuh platform, inclusive of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> trading, as a primary target for fraudulent schemes conducted by scammers. Marc Buerki, Swissquote&rsquo;s CEO, acknowledged the surge in fraudulent activities to AI technologies, which simplify the initiation of malicious campaigns. He also assured that their internal systems remained unaffected by the counterfeit websites.</p>
<p>Despite attempts to reach out, Cointelegraph had not received a response from the company at the time of publishing. Fraudulent activities continue to plague the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> sector, leading to billions of dollars in annual collective losses for users and deterring potential market entrants from acquiring digital assets.</p>
<p>So far in 2025, onchain incidents have resulted in losses approximating $2.1 billion. A significant portion of these losses can be attributed to wallet compromises and phishing attacks. With an increase in data leaks, it is crucial for users to stay alert,&rdquo; stated cybersecurity firm CertiK in May.</p>
<p>Phishing attacks, social engineering strategies, deceptive websites, online impersonation, and address poisoning scams consistently rank among the most prevalent tactics used by threat actors to trick users and misappropriate funds. In April, a senior citizen was targeted in a $330 million heist through a social engineering scam, as per onchain investigator ZachXBT. This theft was categorized as the fifth-largest <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> loss in history.</p>
<p>Even experienced industry experts are falling victim to intricate social engineering scams. In June, <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> venture capitalist Mehdi Farooq, an investment associate at Hypersphere, revealed that a phishing attack had depleted the majority of his life savings.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/">Swissquote Pressured by Regulators to Combat Crypto Fraud and Impersonation Efforts</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/01/swissquote-pressured-by-regulators-to-combat-crypto-fraud-and-impersonation-efforts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</title>
		<link>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</link>
					<comments>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 09:01:02 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Espionage]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Nobitex]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/</guid>

					<description><![CDATA[<p>TRM Labs, a leading crypto analytics organization, has put forth the theory that the infamous $90 million Nobitex crypto exchange hack may have been utilized by Israeli cyber units for espionage purposes. This possible connection was highlighted in the company&#8217;s recent report. The report drew attention to the arrests of three individuals in Israel, allegedly [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TRM Labs, a leading <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> analytics organization, has put forth the theory that the infamous $90 million Nobitex <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange hack may have been utilized by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units for espionage purposes. This possible connection was highlighted in the company&rsquo;s recent report.</p>
<p>The report drew attention to the arrests of three individuals in Israel, allegedly engaged in espionage activities for Iran, which involved surveillance, propaganda, and intelligence collection. The intriguing aspect of this case is that the alleged operatives were remunerated using digital assets, a rarely seen method of payment in state-sponsored espionage.</p>
<p>&ldquo;Digital assets enable cross-border transactions without the need for traditional banking systems, which makes them an ideal tool for covert operations,&rdquo; TRM Labs stated in their report.</p>
<p>One of the suspects, 28-year-old Dmitri Cohen, was purportedly paid $500 in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> for each completed task by Iranian intelligence services. TRM Labs pointed out that these arrests occurred shortly after Nobitex, Iran&rsquo;s largest <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange, was hacked.</p>
<p>Despite no official confirmation of a connection between the hack and the arrests from Israeli authorities, TRM Labs suggests a potential correlation based on the timing and tactical profile.</p>
<p>The Nobitex hack occurred on June 18, where hot wallets across several networks were emptied, resulting in over $90 million in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> asset losses. Notably, the pro-Israeli hacker group Gonjeshke Darande claimed responsibility for this <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> attack.</p>
<p>The group has a history of disrupting and collecting intelligence from Iranian-affiliated platforms. According to TRM Labs, the sequence of events, including Israeli strikes, the Nobitex breach, and the arrests, raises the potential that Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> units may have exploited the Nobitex data for intelligence purposes.</p>
<p>While direct public evidence linking the Nobitex breach to the espionage investigations is lacking, TRM Labs suggests that the theory aligns with known tactics used by Israeli <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> defense teams and Gonjeshke Darande&rsquo;s operational history.</p>
<p>At the time of the hack, onchain analytics platform Chainalysis identified Nobitex as a critical player in Iran&rsquo;s sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space, with numerous ties to illicit activities.</p>
<p>&ldquo;Nobitex&rsquo;s role goes beyond being a local exchange; it serves as a vital hub within Iran&rsquo;s heavily sanctioned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> ecosystem, providing access to global markets for users isolated from traditional finance,&rdquo; Chainalysis report stated.</p>
<p>Previous onchain investigations have linked Nobitex to nefarious actors, including ransomware operators affiliated with the IRGC and sanctioned Russian <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchanges.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/">Israeli Cyber Units Potentially Involved in $90 Million Nobitex Hack for Espionage, Suggests TRM Labs</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/27/israeli-cyber-units-potentially-involved-in-90-million-nobitex-hack-for-espionage-suggests-trm-labs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Devastating Security Breach: Hacken Token Suffers 99% Plunge after $250K Cyberattack</title>
		<link>https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/</link>
					<comments>https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 04:00:58 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacken]]></category>
		<category><![CDATA[HAI]]></category>
		<category><![CDATA[token]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/</guid>

					<description><![CDATA[<p>Following a dangerous security breach, Hacken token&#8217;s value nosedived by approximately 99%. The cybersecurity company Hacken has attributed this drastic fall to a private key leak. This leak facilitated a malevolent actor to create and abscond with $250,000 worth of the Hacken Token (HAI), causing a significant plummet in its value. In a recent announcement, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/">Devastating Security Breach: Hacken Token Suffers 99% Plunge after $250K Cyberattack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Following a dangerous security breach, Hacken token&rsquo;s value nosedived by approximately 99%. The cybersecurity company Hacken has attributed this drastic fall to a private key leak. This leak facilitated a malevolent actor to create and abscond with $250,000 worth of the Hacken Token (HAI), causing a significant plummet in its value.</p>
<p>In a recent announcement, Hacken revealed that the leaked private key was linked to an account with minting capacity on both Ethereum and BNB Chain. This security loophole led to an unauthorized production and subsequent dumping of HAI on decentralized exchanges, triggering a price drop from $0.015 to a meager $0.000056. At present, HAI is trading at $0.00026.</p>
<p>Despite the breach, Hacken&rsquo;s team has successfully taken control of and deactivated the compromised minting account. Yet, it&rsquo;s estimated that the cybercriminal still made away with tokens worth at least $250,000.</p>
<p>Hacken confirmed that the core infrastructure remains unaffected and secure, with the compromise limited to the private keys. The leak occurred during architectural modifications to the company&rsquo;s blockchain bridge, ironically designed to prevent such incidents.</p>
<p>The company has temporarily suspended bridge transactions on Ethereum and BNB Chain as a safety measure. They also issued a warning about non-existent airdrops and scam posts.</p>
<p>Post-hack tokens purchased on the affected networks, BNB Smart Chain and Ethereum, will not be included in the new tokenomics, as stated by Hacken CEO Dyma Budorin.</p>
<p>Hacken&rsquo;s long-term aim is to convert HAI into a regulated financial instrument, combining token utility with equity rights. All legitimate user balances are traceable and those holding HAI tokens will have the option to swap later.</p>
<p>A report by blockchain security firm PeckShield revealed that hackers pilfered over $1.63 billion worth of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> in the first quarter of 2025. Similarly, liquid staking protocol Meta pool also fell victim to a comparable exploit recently.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/">Devastating Security Breach: Hacken Token Suffers 99% Plunge after $250K Cyberattack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/23/devastating-security-breach-hacken-token-suffers-99-plunge-after-250k-cyberattack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</title>
		<link>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</link>
					<comments>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 15:03:07 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</guid>

					<description><![CDATA[<p>Crocodilus, a notorious Android banking trojan, has broadened its malicious campaigns to target cryptocurrency users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial Crocodilus instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details. Recent activities, however, indicate that the Trojan has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Crocodilus</em>, a notorious Android banking trojan, has broadened its malicious campaigns to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial <em>Crocodilus</em> instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details.</p>
<p>Recent activities, however, indicate that the Trojan has extended its scope, striking victims in Poland, Spain, Argentina, Brazil, Indonesia, India, and the US, as per the latest data from ThreatFabric&rsquo;s Mobile Threat Intelligence (MTI) team.</p>
<p>In Poland, the malware exploited Facebook Ads to circulate deceptive loyalty apps. Users who clicked on the advertisement were redirected to harmful websites that delivered a <em>Crocodilus</em> dropper, evading Android 13+ security measures. Facebook&rsquo;s transparency data reveals that these ads reached thousands of users within one to two hours, primarily targeting those aged 35 and above.</p>
<p>Once installed, <em>Crocodilus</em> overlays fraudulent login screens over authentic banking and <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> apps. In Spain, it poses as a browser update, targeting nearly all major banks. Apart from its geographical expansion, <em>Crocodilus</em> has also acquired new skills. These include the ability to alter infected devices&rsquo; contact lists, enabling hackers to add phone numbers labeled as &ldquo;Bank Support&rdquo; for potential social engineering attacks.</p>
<p>Another significant enhancement is an automated seed phrase collector targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets. The <em>Crocodilus</em> malware is now capable of extracting seed phrases and private keys more accurately, providing attackers with pre-processed data for quick account takeovers.</p>
<p>The developers have also bolstered <em>Crocodilus&rsquo;</em> defenses with deeper obfuscation. The newest variant combines packed code, extra XOR encryption, and deliberately complex logic to thwart reverse engineering. MTI analysts have also noted smaller campaigns focusing on <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> <a class="lar-automated-link" href="https://www.goldshell.com/product/goldshell-al-box-%e2%85%b1/?campaign=cryptoupdate&amp;gsaf=fehumarketing" rel="nofollow noopener" target="_blank" 8475>mining</a> apps and European digital banks as part of <em>Crocodilus&rsquo;</em> increasing interest in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>.</p>
<p>Related to this, an April 22 report by <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> forensics and compliance firm AMLBot disclosed that <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> drainers, malware designed to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a>, are becoming more accessible as the ecosystem evolves towards a software-as-a-service business model.</p>
<p>The report revealed that malware spreaders can rent a drainer for as little as 100 to 300 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDt</a> (<a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a>). On May 19, it was disclosed that Procolored, a Chinese printer manufacturer, had been distributing Bitcoin-stealing malware along with its official drivers, using USB drivers to distribute contaminated software and uploading the compromised software to cloud storage for global access.</p>


<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Unveiling Lazarus Group&#8217;s Secrets: BitMEX Developers Dive Deep into Hackers&#8217; Database</title>
		<link>https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/</link>
					<comments>https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 01 Jun 2025 14:02:47 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[BitMEX]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Lazarus Group]]></category>
		<category><![CDATA[north korea]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/</guid>

					<description><![CDATA[<p>BitMEX, a renowned crypto exchange, has recently published an in-depth article on its blog, shedding light on the notorious exploits of North Korea&#8217;s Lazarus Group associated with recent attacks on its platform. The Lazarus Group is infamous for its persistent targeting of the cryptocurrency sector, employing a wide range of deceptive techniques to defraud innocent [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/">Unveiling Lazarus Group&#8217;s Secrets: BitMEX Developers Dive Deep into Hackers&#8217; Database</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>BitMEX</strong>, a renowned <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange, has recently published an in-depth article on its blog, shedding light on the notorious exploits of <em>North Korea&rsquo;s Lazarus Group</em> associated with recent attacks on its platform. The Lazarus Group is infamous for its persistent targeting of the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> sector, employing a wide range of deceptive techniques to defraud innocent <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> investors.</p>
<p>The group has set its sights on various exchanges, including <em>Phemex</em> and <em>Bybit</em>, and they even attempted to deceive a BitMEX staff member by proposing a bogus project as a disguise for a phishing attempt to implant harmful software on the staff member&rsquo;s device. However, BitMEX is now retaliating by delving into the malevolent code deployed by the hacker group.</p>
<p>BitMEX has unearthed serious loopholes that exchanges can leverage to safeguard their assets. This includes revealing the group&rsquo;s tracking databases and originating IP addresses, which allows BitMEX to monitor its functioning hours and single out key players crucial to the group&rsquo;s operations.</p>
<p>The BitMEX team has distinguished different levels for the hackers, ranging from novice hackers performing phishing tasks to experts assigned to conduct post-exploitation procedures. The BitMEX blog post proposes various real-time security breach detection measures, including an internal monitoring system for identifying infections.</p>
<p>BitMEX&rsquo;s sudden interest in cybersecurity stems from a Lazarus Group member reaching out to a BitMEX employee on LinkedIn with a proposition to participate in a counterfeit NFT project. This audacious phishing attempt prompted BitMEX to probe deeper into the matter, which resulted in a chance to analyze live Lazarus code.</p>
<p>BitMEX researchers uncovered a Lazarus Supabase, which contained data related to the malware, such as username, hostname, operating system, geolocation, timestamp, and IP address. With this data, BitMEX identified various devices as either a developer or test machine based on their operational frequency.</p>
<p>While most of the developers utilized VPNs to conceal their location, one developer made an error revealing the actual IP address of the machine, which is located in Jiaxing, China. BitMEX considers this a significant lapse that could potentially unveil the hacker&rsquo;s identity.</p>
<p>BitMEX has now developed a script to automatically analyze the Supabase and search for operational errors. After all, even hackers are prone to mistakes, which can prove to be their downfall. BitMEX&rsquo;s astute analysis of Lazarus Group&rsquo;s operations will continue to enhance their cybersecurity measures and protect their platform.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/">Unveiling Lazarus Group&#8217;s Secrets: BitMEX Developers Dive Deep into Hackers&#8217; Database</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/01/unveiling-lazarus-groups-secrets-bitmex-developers-dive-deep-into-hackers-database/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
