be carefull! This software can drain your Crypto Wallet.
Hackers are getting aggressive to steal cryptos. They have stolen more than $1.2 billion in crypto since January. Reports suggest that most of these abductions are related to the DPRK. The FBI issued a public service announcement on September 3 warning the crypto industry about North Korean hackers. Let's explore what software you should know about.
Alert for Android users
Software security firm McAfee has identified an Android malware called SpyAgent. It has OCR or Optical Character Recognition and scans the phone's storage for images including screenshots of private keys. Remember that not every decentralized wallet should screenshot your keys and better write them down on paper.
According to McAfee Labs, this malware is distributed through malicious links sent via text messages. These programs are disguised as banking applications and ask for general phone permissions including photos and media after installation.
Think you've received a text message saying you're running an outdated version of your banking app, click here to update and enjoy the latest features. And instead of checking this information on Playstore, click on a link that opens a website similar to your bank's website. You have downloaded and installed the application and now all your data is accessible to hackers.
The FBI has also warned of social engineering hacks that are highly tailored to the crypto community. This malware is similar to this one. And these malwares, not only can look like your banking app, but also another government app or game.
Malware attacks on MacOS
If you use macOS and think you can't find such malware on your system, think again. In August, it was revealed that a malware similar to SpyAgent, called Cthulhu Stealer, was targeting Macross. Like all malware, it disguises itself as legitimate software. Once downloaded, it steals the user's personal information, including all kinds of passwords. In addition, it stores passwords for wallets like MetaMask and any private keys stored on the system along with its IP address.
In August, North Korean hackers exploited a vulnerability in the Google Chrome web browser. They then create fake websites impersonating legitimate crypto trading platforms and trick people into downloading a malicious crypto wallet or trading app.
What is the solution?
As hackers become increasingly interested in cryptocurrencies, these malware methods are on the rise. It is very important for users of any device to download any application from its original source. You must verify the URL of the website. Crypto users should not save genealogical images or write them on your computer or mobile device at any cost. As for what you're downloading, always pay attention to what websites you're browsing and don't download unknown apps.
The security of your crypto and personal information is your responsibility. Make sure you keep your devices malware free.