CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
crypto.news 2025-02-03 13:37:00

Russian gang targets crypto holders with cross-platform spear-phishing malware

A Russian cybercrime gang called “Crazy Evil” is behind a new rash of social media phishing scams targeting crypto users. The gang has been identified in a new cybersecurity threats report as the brains behind more than 10 sophisticated social media phishing scams that lure victims into downloading malware that steals their crypto. The scams reportedly make use of highly bespoke social engineering tactics to convince users to drop their guard and install malware such as Angel Drainer, Atomic mac OS Stealer, and StealC. Crazy Evil cyber threat analysis | Source: Insikt Group Providing an insight into the inner working of Crazy Evil, threat research outfit Insikt Group, which made the discovery, said in an announcement : Crazy Evil’s operation is both vast and meticulous. Its six subteams — AVLAND, TYPED, DELAND, ZOOMLAND, DEFI, and KEVLAND — run bespoke scams targeting specific victim profiles. From phishing lures aimed at cryptocurrency influencers to malware payloads designed for cross-platform infection, the group’s tactics reflect an advanced understanding of cybersecurity loopholes. You might also like: Cado Security Labs flags new malware targeting crypto wallets on Windows and macOS According to Insikt, Crazy Evil’s capabilities extend across both Windows and mac OS, giving it a cross-platform advantage in compromising users, which marks out this gang as uniquely dangerous. Insikt also revealed that in addition to its sophisticated social engineering capability and cross-platform abilities, what marks out Crazy Evil is its explicit targeting of crypto holders with malware specifically designed to steal wallet keys and extract other information that may be used to compromise wallet security. To mitigate for the sophistication of Crazy Evil malware attacks, users are encouraged to deploy endpoint detection and response solutions that actively scan for the presence of specific malware families linked to the gang, as well as web monitoring and filtering to block access to malicious domains controlled by Crazy Evil. On Dec. 28, on-chain investigator Taylor Manahan flagged the existence of similar bad actors that used social engineering tactics such as fake Web3 job interviews to install malware on the devices of victims with a view to ultimately stealing their crypto wallet keys. Read more: Scam Sniffer warns of fake Influencers and Telegram bots spreading crypto-malware

阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约