Always, where there is money, those who want to steal it very quickly appear.
The contents of users' cryptocurrency wallets are increasingly becoming the target of Trojan horses and viruses. The constant increase in the interest of Internet scammers in cryptocurrencies is quite understandable - their value is growing every minute. This is why new types of malware appear regularly, but they can all be divided into five main categories.
Viruses and Trojans appeared first, stealing a file with keys from a user’s wallet installed locally (most often, wallet.dat). Keyloggers, clipboard interception, screen capture, etc. are used to obtain passwords from encrypted key files. This category of malware is constantly evolving: support for new wallets and cryptocurrencies is being added, the ability to intercept user information to obtain a password from a key file is expanding, etc.
As soon as it became clear that cryptocurrency mining could bring in a lot of money, the attackers came up with the idea of using their victims’ devices to mine cryptocurrency for their own personal purposes. The victim provides computing power and pays for electricity, and the fraudster receives a net profit. This category of malware does not pose a direct threat to the user's funds, but, in most cases, causes a decrease in the device's performance, as well as its frequent overheating.
Fraudsters have noticed that most users do not check long and complex addresses when making cryptocurrency transactions; almost everyone simply copies the address to the clipboard and then reports it to the correspondent, or they themselves make a transaction to the copied address. Thus, an attacker only needs to track that the address of a cryptocurrency wallet is on the clipboard and replace it with a similar one, but already owned by the author of the Trojan. As a result, the victim herself transfers her funds into the hands of the fraudster, and since Since cancellation of transactions in cryptocurrencies is impossible, the funds will not be returned.
The next category of viruses does not aim to gain access exclusively to cryptocurrency, but poses a great danger to owners of funds in cryptocurrency.. These Trojans are quite complex and represent a whole complex of malicious software that monitors the sites visited by the victim (wallets, exchanges, etc.), tracks keystrokes, mouse movements, regularly captures the screen, intercepts email messages and incoming SMS to gain access to the user’s financial resources.
Well, and of course, we must not forget about the notorious and extremely malicious “encryptors”, which, after infecting a device, encrypt its hard drive, block the system’s operation and extort rewards for unlocking and decrypting data. Lately, more and more often, attackers are demanding payment of funds in cryptocurrency because... in this case, it is almost impossible to track the final recipient.
In our next articles we will definitely give detailed recommendations for ensuring the security of your cyber savings. In any case, always use the latest anti-virus software, activate maximum protection measures for the online services you use and just be vigilant when making transfers and visiting suspicious resources.
You May Also Like
Hackers control more than 2.3 million BTC addresses
The malware discovered by Bleeping Computer controls more than two million Bitcoin addresses and is ready to steal your digital assets the first time you send coins.
A million attacked computers brought hackers $2 million
A malicious program for hidden cryptocurrency mining, distributed among a million computers in China, brought its creators about two million dollars in two years.
