Scan to download
BTC $77,695.44 +4.64%
ETH $2,445.41 +5.28%
BNB $642.96 +3.33%
XRP $1.49 +5.04%
SOL $89.82 +4.14%
TRX $0.3249 -0.49%
DOGE $0.1009 +4.29%
ADA $0.2643 +5.79%
BCH $460.29 +4.86%
LINK $9.77 +4.73%
HYPE $44.82 +0.12%
AAVE $116.37 +7.36%
SUI $1.02 +5.83%
XLM $0.1746 +8.15%
ZEC $342.95 +1.45%
BTC $77,695.44 +4.64%
ETH $2,445.41 +5.28%
BNB $642.96 +3.33%
XRP $1.49 +5.04%
SOL $89.82 +4.14%
TRX $0.3249 -0.49%
DOGE $0.1009 +4.29%
ADA $0.2643 +5.79%
BCH $460.29 +4.86%
LINK $9.77 +4.73%
HYPE $44.82 +0.12%
AAVE $116.37 +7.36%
SUI $1.02 +5.83%
XLM $0.1746 +8.15%
ZEC $342.95 +1.45%

plugin

Hackers impersonate VC and hijack the QuickLens plugin, using ClickFix technology to steal cryptocurrency assets

According to Cointelegraph, hackers are using the "ClickFix" attack method to steal cryptocurrencies, with the latest two attacks involving impersonating venture capital firms and hijacking browser extensions.Cybersecurity company Moonlock Lab reports that scammers impersonate fake VCs such as SolidBit, MegaBit, and Lumax Capital, contacting users via LinkedIn to offer collaboration opportunities, then directing them to click on fake Zoom and Google Meet links. After clicking the link, users are led to a page with a forged Cloudflare "I'm not a robot" verification box; clicking this box copies malicious commands to the clipboard and prompts users to open a terminal to paste the so-called verification code, thus executing the attack.Moonlock Lab points out that this method turns victims into execution mechanisms, bypassing defenses in the security industry. Meanwhile, hackers are also spreading malware by hijacking the Chrome extension QuickLens. This extension allows users to run Google Lens searches directly in the browser, and after ownership was transferred, the new version contains malicious scripts that can initiate ClickFix attacks and steal information.The extension has about 7,000 users, and once hijacked, it searches for cryptocurrency wallet data and recovery phrases to steal funds, as well as scraping Gmail inbox content, YouTube channel data, and login credentials or payment information entered in web forms. The extension has been removed from the Chrome Web Store. The ClickFix technique has been popular among hackers since last year, forcing victims to manually execute malicious payloads, affecting thousands of businesses and multiple industries worldwide.

BitsLab acquires the Japanese security browser plugin KEKKAI Plugin and officially launches BitsLab Safe

ChainCatcher news, the Web3 security organization BitsLab announced that it has completed the acquisition of the security browser plugin KEKKAI Plugin from the Japanese Web3 infrastructure company KEKKAI Labs, and has officially renamed it to BitsLab Safe.KEKKAI Labs is a Japanese tech team focused on Web3 security and infrastructure development, with its core product KEKKAI Plugin having a solid user base and high usage rate in the Asian market.BitsLab stated that this acquisition aims to expand its security capabilities from B-end services to C-end security. BitsLab will retain the original features of KEKKAI Plugin while introducing its own AI-driven security analysis and threat detection technology to expand and upgrade the product's functionality intelligently.It is reported that the renamed BitsLab Safe is a free browser security plugin aimed at ordinary users. Its core features include: automatically simulating the transaction process before executing transactions in the wallet, displaying results in advance, issuing warnings when dangerous contracts or malicious actions are detected, and providing phishing website protection and alerts. BitsLab plans to make this product an important part of its AI security ecosystem.Previously, BitsLab's main business focused on B-end services such as security audits, penetration testing, and vulnerability mining, having provided solutions for over 400 projects covering mainstream ecosystems like Sui, Aptos, TON, and Solana. This acquisition marks a strategic upgrade for BitsLab, aiming to build a complete security protection system "from underlying infrastructure to end users."

Ave.ai has reached a strategic cooperation with DeBox, and Ave.ai will fully integrate the DeBox position chat plugin feature

ChainCatcher news, the on-chain aggregated trading platform Ave.ai announced a deep cooperation with the Web3 one-stop social leader DeBox. The two parties are integrating innovations around the concept of "social as liquidity," focusing on Meme trading and community building.It is reported that Ave.ai's latest official website (pro.ave.ai) has fully integrated the DeBox (debox.pro) holding chat plugin. Each token launched on the platform will automatically generate a dedicated token holding group, allowing users to join the corresponding community and communicate rapidly with other token holders without switching platforms.DeBox has over 11.15 million registered users and 640,000 daily active users, and has formed over 290,000 instant messaging groups based on on-chain asset and behavioral data. DeBox community groups have no upper limit on the number of members and come with powerful group management tools, such as red envelopes, lotteries, token airdrops, and live voice rooms. Ave.ai, as a leading on-chain trading analysis platform, has over 7 million users, aggregating more than 130 chains, as well as features like on-chain real-time trading, historical data, and signal squares.The growth leader of Ave.ai stated that this cooperation aims to break down the barriers between trading and community interaction, gather community liquidity, enhance user experience and efficiency, and promote the investment ecosystem of Web3 assets like Meme towards a more social and community-oriented direction.

Binance responds to "hackers stealing coins through red envelopes": Initial suspicion is that the user's device may have had malicious plugins/software installed, and it is advised to report to the police

ChainCatcher message, Binance responded to "hackers stealing coins through red envelopes" stating: "Based on the current investigation results and the information at hand, we initially suspect that the user's device may have had malicious plugins/software installed, which led to the user's email, Google Authenticator, Binance account, and other account information being sequentially stolen by hackers. The hackers simulated the user's common device and IP environment based on this, successfully passing the verification steps during the red envelope initiation process, ultimately resulting in the theft of funds.It should be noted that when users send red envelopes for payment on the Binance platform, they need to verify their payment PIN/fingerprint or Face ID/authenticator app/email. Therefore, the reason for the theft of the user's account assets through the red envelope function is due to the aforementioned personal information being stolen. It is strongly recommended that the user report this incident to the police. The Binance security risk control team will assist in providing all the information we have and, with the user's cooperation, further investigate their device to jointly identify the final cause. We also remind all users to remain vigilant, enhance their security awareness, and ensure they use secure and clean devices. Be cautious of the security risks to accounts and devices to protect personal asset safety.
app_icon
ChainCatcher Building the Web3 world with innovations.