CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino
ZyCrypto 2025-03-21 13:46:58

“TradingView Premium Cracked” Malware Targets Crypto Wallets on Windows and Mac

Scammers are posting links to what they describe as “TradingView Premium Cracked” for Windows or Mac and sharing the links on Reddit. According to Malwarebytes, the files contain malware that targets crypto wallets and drains tokens. The scammers claim that the cracked version of TradingView allows access to restricted features, an enticing lure for crypto investors who often enjoy browsing the charts and accessing advanced indicators. The scammers claim that the cracked software was sourced directly from the original files but contains two malware programs, Lumma and Atomic. Lumma, a project started in 2022, targets crypto wallets, features two-factor authentication, and focuses on information stealing. Atomic, a project discovered in 2023, is a malware package that has been roaming around in the wild for who knows when. It is notorious for uncovering administrative passwords and credentials. The cracked file is double-zipped, with the second zip containing a password. This should already be a red flag because there is no need to double-zip the file unless one is hiding something from an automated scanner. The installer is a popular malware package called AMOS (Atomic Stealer) with the Mac version. The installer checks whether it is in a sandbox to avoid detection by malware researchers. AMOS then proceeds to steal sensitive data after checking whether there is a sandbox. It sends the package via a POST request to a server located in Seychelles at the address 45.140.13.x. The malware files are hosted on a Dubai-based cleaning company’s website, suggesting the attackers have taken control of the site, given that they could have picked another server for their files. The website has an out-of-date PHP version, 7.3.33, which became vulnerable in December 2021, providing the attackers with an easy target to host their files and launch a malware campaign against cryptocurrency holders. The Windows version extracts information using a BAT file, costs.tiff.bat. It assembles an executable from numerous file fragments, obfuscates automatic virus scanner attacks, and communicates with a command and control centre at cousidporke dot icu, a domain registered in Russia just a week ago. The scammers post the malware links on Reddit and then stick around to help people install the software. Many attack victims may feel more secure due to the constant support offered on Reddit. This seems to be a very dedicated campaign to spread the malware. However, since the target is a cryptocurrency wallet, the effort seems worth it because the attackers are potentially making millions of dollars in stolen funds.

阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约