Search
The Protocol: Self-spreading Malware Found in Privacy Crypto Dero
28.5.2025
Also: Solana On MetaMask, FIFA Taps Avalanche, Square Pilots Real-Time Bitcoin Payments
Privacy Crypto Dero Targeted With New Self-Spreading Malware
28.5.2025
The malware spread like a worm and spawned malicious containers after infecting fresh devices
US DOJ seizes $24M in crypto from accused Qakbot malware developer
23.5.2025
The US Department of Justice (DOJ) has filed a civil forfeiture complaint to seize more than $24 million in cryptocurrency from Rustam Rafailevich Gallyamov, a Russian national accused of developing the Qakbot malware.According to a May 22 announcement, the DOJ unsealed charges against...
Bitcoin stealer malware found in official printer drivers
19.5.2025
Chinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers, according to local media reports.Chinese news outlet Landian News reported on May 19 that Shenzhen-based printer company Procolored has been distributing Bitcoin-stealing (BTC) malware...
Chinese printer maker spread Bitcoin stealing malware — Report
19.5.2025
Chinese printer manufacturer Procolored distributed Bitcoin-stealing malware alongside its official drivers, according to local media reports.Chinese news outlet Landian News reported on May 19 that Shenzhen-based printer company Procolored has been distributing Bitcoin-stealing (BTC) malware...
COLDRIVER using new malware to steal from Western targets — Google
7.5.2025
Threat group COLDRIVER is using new malware to steal documents from Western targets, according to a May 7 report from Google Threat Intelligence. The malware, called LOSTKEYS, shows the evolution of the group from credential phishing to more sophisticated attacks.According to the Google report,...
COLDRIVER using new malware to steal from Western targets — Google
7.5.2025
Threat group COLDRIVER is using new malware to steal documents from Western targets, according to a May 7 report from Google Threat Intelligence. The malware, called LOSTKEYS, shows the evolution of the group from credential phishing to more sophisticated attacks.According to the Google report,...
Crypto drainers now sold as easy-to-use malware at IT industry fairs
23.4.2025
Crypto drainers — malware designed to steal cryptocurrency — have become easier to access as the ecosystem evolves into a software-as-a-service (SaaS) business model.In an April 22 report, crypto forensics and compliance firm AMLBot revealed that many drainer operations have...
Crypto drainers now sold as easy-to-use malware at IT industry fairs
23.4.2025
Crypto drainers, malware designed to steal cryptocurrency, have become easier to access as the ecosystem evolves into a software-as-a-service (SaaS) business model.In an April 22 report, crypto forensics and compliance firm AMLBot revealed that many drainer operations have transitioned to a SaaS...
Crocodilus malware explained: how it targets android crypto wallets
22.4.2025
What is Crocodilus malware? Crocodilus is the latest in a string of Android crypto malware built to steal your cryptoassets.Crocodilus is a sophisticated piece of malware that steals digital assets from Android devices. Named after crocodile references...
Crocodilus malware explained: how it targets android crypto wallets
22.4.2025
What is Crocodilus malware? Crocodilus is the latest in a string of Android crypto malware built to steal your cryptoassets.Crocodilus is a sophisticated piece of malware that steals digital assets from Android devices. Named after crocodile references...
Crocodilus malware explained: how it targets android crypto wallets
22.4.2025
What is Crocodilus malware? Crocodilus is the latest in a string of Android crypto malware built to steal your cryptoassets.Crocodilus is a sophisticated piece of malware that steals digital assets from Android devices. Named after crocodile references...
Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
9.4.2025
Malicious actors are attempting to steal crypto with malware embedded in fake Microsoft Office extensions uploaded to the software hosting site SourceForge, according to cybersecurity firm Kaspersky.One of the malicious listings, called “officepackage,” has real Microsoft Office add-ins...
Hackers are selling counterfeit phones with crypto-stealing malware
3.4.2025
Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...
Android malware ‘Crocodilus’ can take over phones to steal crypto
31.3.2025
Cybersecurity firm Threat Fabric says it has found a new family of mobile-device malware that can launch a fake overlay for certain apps to trick Android users into providing their crypto seed phrases as it takes over the device. Threat Fabric analysts said in a March 28 report that the Crocodilus...
Android malware ‘Crocodilus’ can take over phones to steal crypto
31.3.2025
Cybersecurity firm Threat Fabric says it has found a new family of mobile-device malware that can launch a fake overlay for certain apps to trick Android users into providing their crypto seed phrases as it takes over the device. Threat Fabric analysts said in a March 28 report that the Crocodilus...
Understanding recent credential leaks and the rise of InfoStealer malware
28.3.2025
Opinion by: Jimmy Su, Binance chief security officerThe threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond. InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s...
StilachiRAT malware: How it targets crypto wallets on Chrome
24.3.2025
What is StilachiRAT malware? In November 2024, Microsoft Incident Response researchers uncovered a remote access Trojan (RAT) called StilachiRAT. This discovery highlights the evolving nature of cyber threats, with the malware combining multiple malicious...
StilachiRAT malware: How it targets crypto wallets on Chrome
24.3.2025
What is StilachiRAT malware? In November 2024, Microsoft Incident Response researchers uncovered a remote access Trojan (RAT) called StilachiRAT. This discovery highlights the evolving nature of cyber threats, with the malware combining multiple malicious...
Fake CAPTCHA Forces Users to Run Malware Disguised as Verification Text
22.3.2025
Fake CAPTCHA pages tricked users into pasting malware-laced commands into Windows Run, launching stealth attacks that silently deployed infostealers undetected. Deceptive CAPTCHA Pages Deploy Stealth Malware Using Windows Run Exploit Cybersecurity analysts in New Jersey flagged an alarming malware...