<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Malware &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Mon, 22 Dec 2025 04:01:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</title>
		<link>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/</link>
					<comments>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 04:01:03 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Stealka]]></category>
		<category><![CDATA[video game mods]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/</guid>

					<description><![CDATA[<p>Stealka crypto infostealer is making waves in the cyber world, primarily for its insidious tactic of infiltrating video game mods. The new malware, identified by cybersecurity firm Kaspersky, is designed to target crypto wallets and browser extensions. This article delves into the details of how Stealka is spreading through seemingly innocent game modifications and what [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/">Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer</strong> is making waves in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> world, primarily for its insidious tactic of infiltrating video game mods. The new malware, identified by cybersecurity firm Kaspersky, is designed to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets and browser extensions. This article delves into the details of how Stealka is spreading through seemingly innocent game modifications and what makes it particularly threatening.</p>
<h2>Understanding the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> Infostealer</h2>
<p>Unveiled by Kaspersky, the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer is a sophisticated piece of malware that specifically targets Microsoft Windows users. Disguised as game cheats and mods, this malware has been silently hijacking accounts, stealing cryptocurrencies, and installing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> miners on unsuspecting users&rsquo; computers since its discovery in November.</p>
<p>The malware&rsquo;s distribution channels include legitimate platforms like GitHub, SourceForge, and Google Sites. It&rsquo;s often cloaked as mods for popular games such as Roblox, or software cracks for applications like Microsoft Visio. Kaspersky researcher Artem Ushkov highlighted the use of artificial intelligence in creating deceptive websites that appear professional, further aiding in the spread of this malware.</p>
<h2>Targeted Data and Potential Risks</h2>
<p>The <strong>Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer</strong> is armed with an extensive arsenal of capabilities, making it a formidable threat. Its prime targets include data from browsers built on the Chromium and Gecko engines, putting over 100 browsers, including Chrome, Firefox, and Edge, at risk.</p>
<p>The malware focuses on extracting autofill data such as sign-in credentials, addresses, and payment card details. It also compromises the settings and databases of 115 browser extensions related to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets, password managers, and two-factor authentication services. Among the 80 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets at risk are popular options like Binance, Coinbase, and MetaMask.</p>
<p>Moreover, messaging apps like Discord and Telegram, email clients, password managers, and even VPN applications are vulnerable to this malware.</p>
<h2>Protecting Yourself from Stealka</h2>
<p>To safeguard against the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer, Kaspersky advises using reliable antivirus software and password managers, rather than storing passwords within browsers. Users should avoid pirated software and unofficial game mods, which are common carriers of this malware.</p>
<p>Cloudflare has reported alarming statistics, with over 5% of emails globally containing malicious content. A significant portion includes phishing links, and many HTML attachments are deemed malicious. These figures underscore the importance of vigilance in digital interactions.</p>
<p>In conclusion, the Stealka <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> infostealer represents a growing threat in the digital landscape, particularly for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> enthusiasts. Staying informed and adopting robust security practices are essential steps in countering such <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> threats.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/">Stealka Crypto Infostealer: 5 Shocking Insights into Video Game Mods</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/12/22/stealka-crypto-infostealer-video-game-mods/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</title>
		<link>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/</link>
					<comments>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 12:00:43 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Koi Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[wallet clones]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/</guid>

					<description><![CDATA[<p>In a recent report by cybersecurity company Koi Security, it was revealed that an ongoing malware campaign has been deploying more than 40 fraudulent extensions on the widely-used web browser, Mozilla Firefox. These extensions, masquerading as legitimate wallet tools like MetaMask, Coinbase, Trust Wallet, Phantom, Exodus, OKX, MyMonero, Bitget, among others, aim to pilfer cryptocurrency [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/">Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a recent report by cybersecurity company Koi Security, it was revealed that an ongoing malware campaign has been deploying more than 40 fraudulent extensions on the widely-used web browser, Mozilla Firefox. These extensions, masquerading as legitimate wallet tools like MetaMask, Coinbase, Trust Wallet, Phantom, Exodus, OKX, MyMonero, Bitget, among others, aim to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> credentials from unsuspecting users.</p>
<p>The malicious extensions, once installed, are programmed to steal user wallet credentials. &ldquo;We have connected over 40 different extensions to this active and live campaign,&rdquo; Koi Security stated.</p>
<p>The campaign, which has been running since at least April, uploaded the most recent extensions last week. These fraudulent extensions allegedly extract wallet credentials directly from the targeted sites and upload them to a remote server under the attacker&rsquo;s control.</p>
<p>The report also highlighted how the campaign uses ratings, reviews, branding, and functionality to win user trust by posing as genuine and thus boost installation rates. Some applications even boasted hundreds of fake five-star reviews.</p>
<p>The deceptive extensions used the same names and logos as the real services they were mimicking. In several cases, the threat actors cloned the official extensions&rsquo; open-source code and integrated their malicious code. This deceptive strategy maintained the expected user experience while minimizing the chances of immediate detection.</p>
<p>While Koi Security stated that &ldquo;attribution remains speculative,&rdquo; they pointed to &ldquo;multiple signals indicating a Russian-speaking threat actor.&rdquo; These signals include Russian language comments in the code and metadata found in a PDF file sourced from a malware command-and-control server associated with the incident. &ldquo;Although not definitive, these artifacts suggest that the campaign may be the work of a Russian-speaking threat actor group.&rdquo;</p>
<p>To minimize risk, Koi Security advised users to only install browser extensions from verified publishers and to manage extensions as full software assets, using allowlists and monitoring for unexpected behavior or updates.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/">Malicious Cryptocurrency Wallet Clones Target Mozilla Firefox Users</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/03/malicious-cryptocurrency-wallet-clones-target-mozilla-firefox-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</title>
		<link>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</link>
					<comments>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 15:03:07 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ThreatFabric]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/</guid>

					<description><![CDATA[<p>Crocodilus, a notorious Android banking trojan, has broadened its malicious campaigns to target cryptocurrency users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial Crocodilus instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details. Recent activities, however, indicate that the Trojan has [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Crocodilus</em>, a notorious Android banking trojan, has broadened its malicious campaigns to target <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users and banking clients in Europe and South America. First identified in Turkey in March 2025, initial <em>Crocodilus</em> instances primarily masqueraded as online casino apps or counterfeit bank apps to capture login details.</p>
<p>Recent activities, however, indicate that the Trojan has extended its scope, striking victims in Poland, Spain, Argentina, Brazil, Indonesia, India, and the US, as per the latest data from ThreatFabric&rsquo;s Mobile Threat Intelligence (MTI) team.</p>
<p>In Poland, the malware exploited Facebook Ads to circulate deceptive loyalty apps. Users who clicked on the advertisement were redirected to harmful websites that delivered a <em>Crocodilus</em> dropper, evading Android 13+ security measures. Facebook&rsquo;s transparency data reveals that these ads reached thousands of users within one to two hours, primarily targeting those aged 35 and above.</p>
<p>Once installed, <em>Crocodilus</em> overlays fraudulent login screens over authentic banking and <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> apps. In Spain, it poses as a browser update, targeting nearly all major banks. Apart from its geographical expansion, <em>Crocodilus</em> has also acquired new skills. These include the ability to alter infected devices&rsquo; contact lists, enabling hackers to add phone numbers labeled as &ldquo;Bank Support&rdquo; for potential social engineering attacks.</p>
<p>Another significant enhancement is an automated seed phrase collector targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets. The <em>Crocodilus</em> malware is now capable of extracting seed phrases and private keys more accurately, providing attackers with pre-processed data for quick account takeovers.</p>
<p>The developers have also bolstered <em>Crocodilus&rsquo;</em> defenses with deeper obfuscation. The newest variant combines packed code, extra XOR encryption, and deliberately complex logic to thwart reverse engineering. MTI analysts have also noted smaller campaigns focusing on <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> <a class="lar-automated-link" href="https://www.goldshell.com/product/goldshell-al-box-%e2%85%b1/?campaign=cryptoupdate&amp;gsaf=fehumarketing" rel="nofollow noopener" target="_blank" 8475>mining</a> apps and European digital banks as part of <em>Crocodilus&rsquo;</em> increasing interest in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>.</p>
<p>Related to this, an April 22 report by <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> forensics and compliance firm AMLBot disclosed that <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> drainers, malware designed to pilfer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a>, are becoming more accessible as the ecosystem evolves towards a software-as-a-service business model.</p>
<p>The report revealed that malware spreaders can rent a drainer for as little as 100 to 300 <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDt</a> (<a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a>). On May 19, it was disclosed that Procolored, a Chinese printer manufacturer, had been distributing Bitcoin-stealing malware along with its official drivers, using USB drivers to distribute contaminated software and uploading the compromised software to cloud storage for global access.</p>


<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/">Crocodilus Malware Expands Reach Globally, Targets Crypto and Banking Platforms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/03/crocodilus-malware-expands-reach-globally-targets-crypto-and-banking-platforms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crypto Chief Highlights &#8216;ELUSIVE COMET&#8217; Dangers After Suffering 75% Asset Loss</title>
		<link>https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/</link>
					<comments>https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Tue, 15 Apr 2025 06:00:51 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ELUSIVE COMET]]></category>
		<category><![CDATA[Emblem Vault]]></category>
		<category><![CDATA[Ether]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/</guid>

					<description><![CDATA[<p>The CEO of Emblem Vault, a non-fungible token (NFT) platform, is cautioning users about the video conferencing application Zoom, following a damaging cyber attack by a malicious entity referred to as &#8220;ELUSIVE COMET&#8221; that resulted in a loss of over $100,000 of his personal assets. This incident occurred on April 11. Jake Gallen, the CEO [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/">Crypto Chief Highlights &#8216;ELUSIVE COMET&#8217; Dangers After Suffering 75% Asset Loss</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The CEO of Emblem Vault, a non-fungible token (NFT) platform, is cautioning users about the video conferencing application Zoom, following a damaging <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cyber</a> attack by a malicious entity referred to as &ldquo;ELUSIVE COMET&rdquo; that resulted in a loss of over $100,000 of his personal assets. This incident occurred on April 11.</p>
<p>Jake Gallen, the CEO of Emblem Vault, a podcaster, and an NFT enthusiast, announced that he had fallen victim to a &ldquo;comprehensive computer breach&rdquo; which resulted in significant <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> and Ether losses from various wallets. He stated, &ldquo;Regrettably, this resulted in a loss of more than $100,000 in purchased digital assets.&rdquo;</p>
<p>Gallen revealed that he had been cooperating with cybersecurity company, The Security Alliance (SEAL), to track down an ongoing scheme targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users, orchestrated by the threat actor &ldquo;ELUSIVE COMET&rdquo;. He attributed the scam to Zoom, which he claims facilitated the draining of his <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallet.</p>
<p>He stated, &ldquo;We discovered a malware file that was installed on my computer during a Zoom call with a YouTube influencer with over 90k followers&rdquo;, on April 14. The malevolent entity &ldquo;uses advanced social engineering tactics to trick victims into installing malware, ultimately pilfering their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>,&rdquo; as reported by SEAL in late March.</p>
<p>After being contacted by &ldquo;Tactical Investing&rdquo;, a verified account which claimed to be the founder and CEO of Fraction Mining, Gallen set up an interview. During this meeting, Tactical Investing kept their screen off while Gallen&rsquo;s was on, allowing the installation of malware named &ldquo;GOOPDATE&rdquo; that stole his credentials and accessed his <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets.</p>
<p>Gallen has also noted that the attackers were able to infiltrate his Ledger wallet, despite him only having accessed it a few times over three years, and never having digitally written down the password. The hackers also compromised his account in a bid to attract more victims through private messages.</p>
<p>SEAL has reported that &ldquo;ELUSIVE COMET&rdquo; is linked to Aureon Capital, which posits itself as a legitimate venture capital firm. The malicious actor is accountable for &ldquo;millions of dollars in stolen funds&rdquo; and poses a significant threat to users due to their &ldquo;carefully crafted backstory&rdquo;, according to the firm. Users who have interacted with Aureon Capital are advised to contact SEAL&rsquo;s emergency hotline on Telegram.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/">Crypto Chief Highlights &#8216;ELUSIVE COMET&#8217; Dangers After Suffering 75% Asset Loss</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/04/15/crypto-chief-highlights-elusive-comet-dangers-after-suffering-75-asset-loss/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</title>
		<link>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/</link>
					<comments>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Thu, 03 Apr 2025 06:01:00 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Triada]]></category>
		<category><![CDATA[Trojan]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/</guid>

					<description><![CDATA[<p>Cointelegraph reveals that scammers are peddling fake Android smartphones carrying preinstalled malware aimed at stealing cryptocurrency and other sensitive data. This alarming report comes from cybersecurity titan Kaspersky. These counterfeit Android devices are being sold at discounted rates, but they come preinfected with a variant of the notorious Triada Trojan. This malware infects every function [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/">Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cointelegraph</em> reveals that scammers are peddling fake Android smartphones carrying preinstalled malware aimed at stealing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> and other sensitive data. This alarming report comes from cybersecurity titan Kaspersky.</p>
<p>These counterfeit Android devices are being sold at discounted rates, but they come preinfected with a variant of the notorious Triada Trojan. This malware infects every function of the phone, providing the hackers with virtually limitless control over the device, warned Kaspersky in their April 1 statement.</p>
<p>Dmitry Kalinin, a cybersecurity specialist at Kaspersky, explained that the Trojan allows the perpetrators to steal <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> by switching wallet addresses once access to the device is granted. &ldquo;The creators of the new Triada variant are reaping significant financial benefits. Based on transaction analysis, they&rsquo;ve managed to funnel roughly $270,000 in multiple cryptocurrencies into their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallets,&rdquo; he shared.</p>
<p>However, the real figure could be much larger, as the attackers also targeted Monero, a <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> renowned for its anonymity. The Trojan also has the ability to pilfer user account details and intercept all text messages, including two-factor authentication.</p>
<p>The Trojan infiltrates smartphone firmware before the device even reaches consumers. Some online vendors may unsuspectingly be selling these infected phones. &ldquo;The supply chain is likely compromised at some point, so sellers may unknowingly be vending smartphones infected with Triada,&rdquo; Kalinin conjectured.</p>
<p>As of now, Kaspersky researchers have detected 2,600 instances of this scam across several countries. The majority of these cases were encountered in Russia in the first quarter of 2025.</p>
<p>First discovered in 2016, the Triada malware is notorious for targeting financial apps and messaging services like WhatsApp, Facebook, and Google Mail. It is typically spread via malicious downloads and phishing schemes, according to cybersecurity firm Darktrace.</p>
<p>&ldquo;The Triada Trojan has been around for a while and continues to be one of the most sophisticated and potent threats to Android,&rdquo; emphasized Kalinin. Kaspersky Labs advises consumers to protect themselves by purchasing devices only from authorized distributors and immediately installing security solutions after purchase.</p>
<p>Other cybersecurity firms have been flagging novel forms of malware targeting <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> users. On March 28, Threat Fabric reported finding a new malware family that baits Android users into revealing their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> seed phrases by launching a misleading overlay as it assumes control of the device.</p>
<p>Earlier, on March 18, tech behemoth Microsoft discovered a new remote access trojan (RAT) that targets <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> stored in 20 wallet extensions for the Google Chrome browser.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/">Beware of Fraudulent Phones Preloaded with Crypto-Stealing Malware</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/04/03/beware-of-fraudulent-phones-preloaded-with-crypto-stealing-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cthulhu Stealer: A Serious Threat to Cryptocurrency Wallets on macOS</title>
		<link>https://cryptoupdate.io/2024/08/26/cthulhu-stealer-a-serious-threat-to-cryptocurrency-wallets-on-macos/</link>
					<comments>https://cryptoupdate.io/2024/08/26/cthulhu-stealer-a-serious-threat-to-cryptocurrency-wallets-on-macos/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 26 Aug 2024 07:56:32 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Binance]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[macOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MetaMask]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/?p=8523</guid>

					<description><![CDATA[<p>A newly discovered malware, Cthulhu Stealer, is posing a significant threat to macOS users, especially those managing cryptocurrency assets. This malware-as-a-service (MaaS) targets macOS through deceptive means, such as masquerading as legitimate applications like CleanMyMac or Adobe GenP, or even as a fake early release of &#8220;Grand Theft Auto VI.&#8221; Once the user mounts the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2024/08/26/cthulhu-stealer-a-serious-threat-to-cryptocurrency-wallets-on-macos/">Cthulhu Stealer: A Serious Threat to Cryptocurrency Wallets on macOS</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A newly discovered malware, <strong>Cthulhu Stealer</strong>, is posing a significant threat to macOS users, especially those managing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> assets. This malware-as-a-service (MaaS) targets macOS through deceptive means, such as masquerading as legitimate applications like CleanMyMac or Adobe GenP, or even as a fake early release of &ldquo;Grand Theft Auto VI.&rdquo; Once the user mounts the malicious DMG file and enters their credentials, the malware begins to steal sensitive data.</p>



<p><strong>How Does Cthulhu Stealer Compromise macOS?</strong></p>



<p>Cthulhu Stealer starts its attack by using <strong>osascript</strong>, a macOS tool, to extract passwords from the system&rsquo;s Keychain. This stolen data, which includes information from various <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> wallets like MetaMask, Binance, and Coinbase, is compiled into a zip archive labeled with the user&rsquo;s country code and attack timestamp. The malware also steals data from:</p>



<ul class="wp-block-list">
<li><strong>Chrome extension wallets</strong></li>



<li><strong>Minecraft user information</strong></li>



<li><strong>Wasabi wallet</strong></li>



<li><strong>Keychain passwords</strong></li>



<li><strong>SafeStorage passwords</strong></li>



<li><strong>Battlenet game, cache, and log data</strong></li>



<li><strong>Firefox cookies</strong></li>



<li><strong>Daedalus wallet</strong></li>



<li><strong>Electrum wallet</strong></li>



<li><strong>Atomic wallet</strong></li>



<li><strong>Harmony wallet</strong></li>



<li><strong>Enjin wallet</strong></li>



<li><strong>Hoo wallet</strong></li>



<li><strong>Dapper wallet</strong></li>



<li><strong>Coinomi wallet</strong></li>



<li><strong>Trust wallet</strong></li>



<li><strong>Blockchain wallet</strong></li>



<li><strong>XDeFi wallet</strong></li>



<li><strong>Browser cookies</strong></li>



<li><strong>Telegram Tdata account information</strong></li>
</ul>



<p>Additionally, it collects system information, such as IP address, system name, and OS version, which is then sent to a command and control (C2) server. This enables attackers to further refine their malicious activities.</p>



<p><strong>Scammers Profit by Selling Cthulhu Stealer for $500/Month</strong></p>



<p>Scammers exploit this malware by selling it as a service for $500 per month. They employ various tactics to deceive users into downloading the malware, such as posing as employers offering jobs that require software installation. These offers often create a sense of urgency, prompting users to quickly download and install the malware.</p>



<p><strong>Protecting Against Cthulhu Stealer</strong></p>



<p>To avoid falling victim to this threat, macOS users should install reliable antivirus software specifically designed for their system. It&rsquo;s also crucial to be skeptical of job offers or other opportunities that demand immediate software downloads. Regularly updating your software can further mitigate the risk of malware infection.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2024/08/26/cthulhu-stealer-a-serious-threat-to-cryptocurrency-wallets-on-macos/">Cthulhu Stealer: A Serious Threat to Cryptocurrency Wallets on macOS</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2024/08/26/cthulhu-stealer-a-serious-threat-to-cryptocurrency-wallets-on-macos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
