A new type of cryptocurrency malware is spreading through YouTube, tricking users into downloading software designed to steal data from 30 crypto wallets and crypto browser extensions.
June 30th Cyber Intelligence Company Cyble blog According to the post, he was tracking malware known as “PennyWise.” It seems to be named after the monster in Stephen King’s horror novel “It”. first time Identified in May.
“Our research shows that Steeler is a new threat,” Cyble wrote in a June 30 blog post.
“In the current iteration, this stealer can target over 30 browsers and cryptocurrency applications such as cold crypto wallets and crypto browser extensions.”
Data stolen from the victim’s system is provided in the form of Chromium and Mozilla browser information, such as cryptocurrency extension data and login data. You can also take screenshots and steal sessions from chat applications such as Discord and Telegram.
The malware also supports cold crypto wallets such as Armory, Bytecoin, Jaxx, Exodus, Electrum, Atomic Wallet, Guarda, Coinomi, and wallets that support Zcash and Ethereum by searching for wallet files in the directory and sending a copy. Target. According to Cyble, a file to the attacker.
Cybersecurity companies have pointed out that malware is spreading to YouTube mining educational videos that claim to be free Bitcoin mining software.
Cyber criminals, or “threat actors,” have antivirus software that allows them to run malware successfully while uploading videos that instruct viewers to access the links in the description to download free software. Prompt to disable it.
According to Cyble, the attacker had as many as 80 videos on the YouTube channel as of June 30, but the identified channel was subsequently removed.
A search by Cointelegraph found that similar links to the malware remained on other small YouTube channels. The videos include free NFT mining, paid software cracks, free Spotify premium, game cheats and mods.
Many of these accounts have only been created within the last 24 hours.
Related: Bitcoin steals malware: a bitter reminder to keep crypto users alert
Interestingly, the malware is designed to thwart itself if the victim is found to be based in Russia, Ukraine, Belarus or Kazakhstan. Cyble also discovered that when the data was sent back to the attacker, the malware converted the victim’s stolen time zone data into Russian Standard Time (RST).
February, malware Mars stealer identified It targets crypto wallets that act as Chromium browser extensions such as MetaMask, Binance Chain Wallet, and Coinbase Wallet.
Chain analysis Warning in January Even “unskilled cybercriminals” are currently using malware to raise money from crypto hodler, cryptojacking 73% of the total value received by malware-related addresses between 2017 and 2021. Jacking occupies.