• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new bhunt password stealer malware targeting cryptocurrency wallets

New BHUNT Password Stealer Malware Targeting Cryptocurrency Wallets

You are here: Home / General Cyber Security News / New BHUNT Password Stealer Malware Targeting Cryptocurrency Wallets
January 20, 2022

A new evasive crypto wallet stealer named BHUNT has been noticed in the wild with the objective of monetary obtain, introducing to a checklist of electronic forex thieving malware these types of as CryptBot, Redline Stealer, and WeSteal.

“BHUNT is a modular stealer composed in .NET, capable of exfiltrating wallet (Exodus, Electrum, Atomic, Jaxx, Ethereum, Bitcoin, Litecoin wallets) contents, passwords saved in the browser, and passphrases captured from the clipboard,” Bitdefender researcher stated in a specialized report on Wednesday.

The campaign, dispersed globally throughout Australia, Egypt, Germany, India, Indonesia, Japan, Malaysia, Norway, Singapore, South Africa, Spain, and the U.S., is suspected to be delivered to compromised systems by using cracked software program installers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

The modus operandi of working with cracks as an an infection source for preliminary obtain mirrors identical cybercrime campaigns that have leveraged applications these as KMSPico as a conduit for deploying malware. “Most infected people also experienced some form of crack for Windows (KMS) on their units,” the scientists mentioned.

The attack sequence starts with the execution of an initial dropper, which proceeds to compose intensely-encrypted interim binaries that are then utilised to launch the major component of the stealer — a .NET malware that incorporates different modules to facilitate its malicious pursuits, the success of which are exfiltrated to a remote server —

  • blackjack – steal wallet file contents
  • chaos-crew – down load added payloads
  • golden7 – siphon cookies from Firefox and Chrome as properly as passwords from clipboard
  • Sweet_Bonanza – steal saved passwords from browsers these types of as Internet Explorer, Firefox, Chrome, Opera, and Safari, and
  • mrpropper – clean up up traces

The facts theft could also have a privacy affect in that the passwords and account tokens stolen from the browser cache could be abused to commit fraud and to gain other economical advantages.

“The most effective way to protect towards this risk is to prevent setting up program from untrusted resources and to preserve security options up to date,” the scientists concluded.

Uncovered this write-up intriguing? Abide by THN on Facebook, Twitter  and LinkedIn to examine a lot more exceptional content material we publish.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «microsoft: hackers exploiting new solarwinds serv u bug related to log4j Microsoft: Hackers Exploiting New SolarWinds Serv-U Bug Related to Log4j Attacks
Next Post: A Trip to the Dark Site — Leak Sites Analyzed a trip to the dark site — leak sites analyzed»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.