Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Crypto Enthusiasts Targeted in Multi-Vector Malware Attack Disguised As Python-Based Trading Tool: Report

Crypto Enthusiasts Targeted in Multi-Vector Malware Attack Disguised As Python-Based Trading Tool: Report

Daily HodlDaily Hodl2024/10/29 16:00
By:by Mehron Rokhy

Malware disguised as a Python-based trading bot has reportedly targeted crypto traders in a multi-vector supply chain attack.

According to a new blog post by cloud-based cybersecurity firm Checkmarx, crypto enthusiasts have been targeted by advanced malware cloaked as a suite of artificial intelligence (AI)-based crypto trading tools that aim to steal sensitive data and drain crypto wallets.

Checkmarx says the malware was distributed through code-sharing platform GitHub and PyPi (Python Package Index), a centralized location for Python packages, and targeted both Windows and Mac operating systems.

According to Checkmarx, the malware utilized deceptive graphical user interface to distract victims and a multi-stage infection process that led victims to a fake website.

“The CryptoAITools malware employs a sophisticated multi-stage infection process, leveraging a fake website to deliver its secondary payloads…

A unique aspect of this attack, compared to many malicious packages we have seen in the past, is that the CryptoAITools malware incorporates a graphical user interface (GUI) as a key component of its social engineering strategy.

This GUI appears the moment the second-stage malware is activated and presents itself as an ‘AI Bot Starter’ application. It is designed to distract users and collect sensitive information while the malware operates covertly.”

The attacker also set up a Telegram channel masquerading as the product’s tech support, further tricking users with offers of free trials.

“In the Telegram chat, the attacker employs various tactics to lure potential victims. They offer ‘bot support’ to establish credibility and trust. To entice users, they promote their GitHub repository as hosting their ‘most powerful bot,’ appealing to those seeking advanced trading tools.

The attacker then proposes an attractive offer: a free trial period followed by a monthly subscription model, making the proposition seem both risk-free and professional.”

Checkmarx says the malware had “severe” consequences on its victims, including the potential theft of their identities, browser data, sensitive computer files, and digital assets.

Don't Miss a Beat – Subscribe to get email alerts delivered directly to your inbox

Check Price Action

Follow us on X , Facebook and Telegram

Surf The Daily Hodl Mix

Generated Image: Midjourney

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!