Scan to download
BTC $77,782.94 +4.88%
ETH $2,445.90 +5.51%
BNB $642.71 +3.67%
XRP $1.49 +5.34%
SOL $89.91 +4.76%
TRX $0.3247 -0.73%
DOGE $0.1005 +5.36%
ADA $0.2653 +6.36%
BCH $459.49 +4.83%
LINK $9.77 +5.58%
HYPE $44.94 +0.88%
AAVE $116.00 +9.57%
SUI $1.02 +6.13%
XLM $0.1741 +8.26%
ZEC $347.40 +3.34%
BTC $77,782.94 +4.88%
ETH $2,445.90 +5.51%
BNB $642.71 +3.67%
XRP $1.49 +5.34%
SOL $89.91 +4.76%
TRX $0.3247 -0.73%
DOGE $0.1005 +5.36%
ADA $0.2653 +6.36%
BCH $459.49 +4.83%
LINK $9.77 +5.58%
HYPE $44.94 +0.88%
AAVE $116.00 +9.57%
SUI $1.02 +6.13%
XLM $0.1741 +8.26%
ZEC $347.40 +3.34%

trojan

macOS Trojan Upgrade: Disguised as Signed Applications for Distribution, Users Face More Subtle Risks

The Chief Information Security Officer of Slow Fog, 23pds, shared that the MacSync Stealer malware, active on the macOS platform, has shown significant evolution, with user assets already being stolen.The forwarded article mentions that it has upgraded from early low-threshold inducement methods like "dragging to terminal" and "ClickFix" to code signing and notarized Swift applications by Apple, significantly enhancing its concealment. Researchers found that the sample spreads in the form of a disk image named zk-call-messenger-installer-3.9.2-lts.dmg, disguising itself as instant messaging or utility applications to induce users to download. Unlike previous versions, the new version does not require any terminal operations from the user; instead, a built-in Swift helper pulls and executes encoded scripts from a remote server, completing the information theft process.The malware has completed code signing and has been notarized by Apple, with the developer team ID being GNJLS3UYZ4, and the relevant hash has not been revoked by Apple during analysis. This means it has a higher "trustworthiness" under the default macOS security mechanisms, making it easier to bypass user vigilance. The research also found that the DMG is unusually large, containing bait files such as LibreOffice-related PDFs to further reduce suspicion.Security researchers point out that such information-stealing Trojans often target browser data, account credentials, and cryptocurrency wallet information. As malware begins to systematically abuse Apple’s signing and notarization mechanisms, the risks of phishing and private key leakage for cryptocurrency users in the macOS environment are on the rise.

Microsoft warns of a new remote access Trojan targeting cryptocurrency wallets

According to ChainCatcher news reported by Cointelegraph, tech giant Microsoft has discovered a new type of Remote Access Trojan (RAT) that specifically targets 20 cryptocurrency wallet extensions in the Google Chrome browser to steal crypto assets.The Microsoft Incident Response team revealed in a blog post on March 17 that they first detected the malware named StilachiRAT last November. This software is capable of stealing credentials, digital wallet information, and clipboard data stored in the browser. Once deployed, attackers can use StilachiRAT to scan the configuration information of the 20 cryptocurrency wallet extensions to steal crypto wallet data, including wallets such as Coinbase Wallet, Trust Wallet, MetaMask, and OKX Wallet.Microsoft's analysis pointed out: "Research on the WWStartupCtrl64.dll module of StilachiRAT, which contains RAT functionality, indicates that it employs multiple methods to steal information from the target system." Among other features, the malware can extract credentials stored in the Google Chrome local state file and monitor clipboard activity to obtain sensitive information such as passwords and encryption keys. It also has detection evasion and anti-forensics capabilities, such as clearing event logs and checking if it is running in a sandbox to thwart analysis attempts.Currently, Microsoft has not been able to identify the perpetrators behind the malware but hopes to reduce the number of potential victims by publicly sharing information. Microsoft advises users to take measures to avoid becoming victims of the malware, including installing antivirus software, and cloud-based anti-phishing and anti-malware components on their devices.
app_icon
ChainCatcher Building the Web3 world with innovations.