Cryptocurrency

A new strain of crypto-malware is being spread via YouTube, tricking users to download software that’s designed to steal data from 30 crypto wallets and crypto-browser extensions.

Cyber intelligence company Cyble in a June 30 blog post said it had been tracking the malware known as “PennyWise” — likely named after the monster in Stephen King’s horror novel “It” — since it was first identified in May.

“Our investigation indicates that the stealer is an emerging threat,” wrote Cyble in a blog post on June 30.

“In its current iteration, this stealer can target over 30 browsers and cryptocurrency applications such as cold crypto wallets, crypto-browser extensions, etc.”

Data stolen from the victim’s system comes in the form of Chromium and Mozilla browser information, including cryptocurrency extension data and login data. It can also take screenshots and steal sessions of chat applications such as Discord and Telegram.

The malware also targets cold crypto-wallets such as Armory, Bytecoin, Jaxx, Exodus, Electrum, Atomic Wallet, Guarda, and Coinomi, as well as wallets supporting Zcash and Ethereum by looking for wallet files in the directory and sending a copy of the files to attackers, according to Cyble.

The cybersecurity company noted that the malware is being spread on YouTube mining education videos purporting to be free Bitcoin mining software.

The cybercriminals, or “Threat Actors” upload videos instructing viewers to visit the link in the description and download the free software, whilst also encouraging them also to disable their antivirus software which enables the malware to run successfully.

Cyble said the attacker had as many as 80 videos on their YouTube channel as of June 30 however, the channel identified has since been removed.

A search by Cointelegraph found similar links to the malware remain on other smaller YouTube channels, with videos promising free NFT-mining, cracks for paid software, free Spotify premium, game cheats and mods.

Many of these accounts have only been created within the last 24 hours.

Related: Bitcoin stealing malware: Bitter reminder for crypto users to stay vigilant

Interestingly, the malware is designed to stop itself if it finds out the victim is based in Russia, Ukraine, Belarus, and Kazakhstan. Cyble also found that the malware converts the victim’s stolen timezone data to Russian Standard Time (RST) when the data is sent back to the attackers.

In February, malware named Mars Stealer was identified as targeting crypto wallets that work as Chromium browser extensions such as MetaMask, Binance Chain Wallet or Coinbase Wallet.

Chainalysis warned in January that even “low-skilled cybercriminals” are now using malware to take funds from crypto hodlers, with cryptojacking accounting for 73% of the total value received by malware-related addresses between 2017 and 2021.

Articles You May Like

We’re making another trim of a stock under pressure to protect hard-fought profits
Mutual fund inflows top $1.2B, half into HY
Anatomy of a deal: the University of Chicago’s Midwest winner
G20 waters down support for Ukraine amid pressure for peace talks
Anatomy of a deal: Calcasieu Bridge’s public-private partnership winner