CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
BitcoinSistemi 2025-02-26 11:43:11

Cyber Security Firm Kaspersky Revealed One of the Hackers' Theft Methods! Users in Turkey Are Also in Danger! Here Are the Details

Cybercriminals are using fake GitHub repositories to spread malware that steals Bitcoin (BTC) and other cryptocurrencies, cybersecurity firm Kaspersky has warned. Kaspersky Warns Hackers Are Using Fake GitHub Code to Steal Bitcoin A malware campaign dubbed “GitVenom” has been active for at least two years and has been increasingly present on the popular code-sharing platform GitHub, according to Kaspersky's latest report. The attack begins with seemingly legitimate open-source projects, such as Telegram bots or gaming tools to manage crypto wallets, but hides malicious code designed to steal crypto assets. How Does GitVenom Work? The malware is cleverly hidden in GitHub repositories: Each project appears legitimate and often includes an AI-generated README file to build trust. Ancak, kod gizli kötü amaçlı komut dosyaları içeriyor. In Python-based projects, attackers hide malware behind 2,000 empty tab spaces in the script, which decrypts and runs a malicious payload. In JavaScript-based projects, a fake function embedded in the main file triggers a malware attack. Once activated, the malware downloads additional tools from hacker-controlled GitHub repositories. How to Steal Crypto? Once installed, GitVenom uses multiple tools to steal sensitive user data: Node.js-based password and crypto wallet thieves extract stored passwords, wallet details, and browsing history, then send them to hackers via Telegram. Remote access trojans (RATs) such as AsyncRAT and Quasar hijack a victim's device, logging keystrokes and capturing screenshots. A clipper redirects cryptocurrency transactions by replacing copied wallet addresses with those of the attacker. One such wallet received 5 BTC ($485,000) in stolen funds in November alone. Kaspersky noted that GitVenom is particularly active in Russia, Brazil, and Turkey, but its reach is global. Attackers remain undetected by imitating active development and constantly changing their coding tactics to evade antivirus detection. How to Stay Safe? Kaspersky advises developers and crypto users to: Review code carefully before running it. Verify the authenticity of any GitHub project. Be wary of overly exaggerated READMEs or inconsistent commit histories. As cyberattacks continue to increase, GitVenom is unlikely to disappear. “We expect these attacks to continue in the future, with likely minor changes in tactics,” Kaspersky concluded. *This is not investment advice. Continue Reading: Cyber Security Firm Kaspersky Revealed One of the Hackers' Theft Methods! Users in Turkey Are Also in Danger! Here Are the Details

阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约