Close Menu

    Ecosistema Stacks Defi: las mejores aplicaciones y herramientas STX DeFi (con comentarios)

    May 5, 2024

    Minería a través del halving de Bitcoin: estrategias de supervivencia para 2024

    April 14, 2024

    Los 7 principales fabricantes de baterías de iones de litio

    April 14, 2024

    El retroceso del mercado alcista de las criptomonedas | Sin banco

    April 14, 2024
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    despertarcripto.com
    • Home
    • Blog
    • Criptomonedas
    • Blockchain
    • DeFi
    • Privacidad Cripto
    • NFT & Arte Digital
    • Airdrop
    • Educacional
    • Regulación
    • Seguridad
    despertarcripto.com
    Home»Seguridad»New XPhase Clipper’s Proliferation via Deceptive Crypto Sites and Cloned YouTube Videos — Cyble
    Seguridad

    New XPhase Clipper’s Proliferation via Deceptive Crypto Sites and Cloned YouTube Videos — Cyble

    despertarcripto.comBy despertarcripto.comFebruary 10, 2024No Comments10 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Key Takeaways 

    • Cyble Research and Intelligence Labs (CRIL) has uncovered an active malware campaign targeting cryptocurrency users. 
    • In this campaign, the Threat Actors (TA) utilized deceptive websites posing as legitimate cryptocurrency applications, including Metamask, Wazirx, Lunoapp, and Cryptonotify. 
    • All these malicious sites are distributing the same clipper payload – that CRIL has dubbed “XPhase Clipper” – designed to intercept and modify cryptocurrency wallet addresses copied by users. 
    • The TA orchestrating this mass campaign primarily focuses on targeting cryptocurrency users worldwide, although a handful of phishing sites have been specifically tailored to exploit Indian and Russian crypto users. 
    • The malware infection progresses through multiple stages: a zip file containing a malicious executable dropper, VB Script, and Batch script files, followed by the execution of the clipper payload in the form of a DLL file. 
    • The MetaMask phishing domain utilized in this campaign was connected to an email address that was associated with a phishing campaign back in December 2022. This suggests the possibility of the same threat actor (TA) being responsible for both campaigns. 
    • The TA is specifically targeting Indian cryptocurrency users through the WazirX phishing site, exploiting the trust associated with the Indian Bitcoin and cryptocurrency exchange. 
    • The TA created a deceptive YouTube channel with a single video featuring the WazirX phishing site’s URL in its title. This video was copied from a YouTube account with over 150K subscribers, known for cryptocurrency-related content. 

    Overview 

    CRIL has identified a malware campaign aimed at cryptocurrency users. In this campaign, Threat Actors (TA) employed deceptive websites masquerading as legitimate cryptocurrency applications. Notably, we encountered several phishing sites targeting users of Metamask, Wazirx, Lunoapp, and Cryptonotify. All these phishing sites are distributing the same clipper payload, which we have named “XPhase Clipper”.  

    Clipper malware is a type of malicious software designed to intercept and modify data exchanged between the user and a legitimate application or service, in this case, cryptocurrency wallets or exchanges. The primary purpose of clipper malware is to replace cryptocurrency wallet addresses copied by users with addresses controlled by the attacker. When users intend to transfer cryptocurrency funds, they often copy and paste wallet addresses from one application to another. Clipper malware hijacks this process, allowing attackers to redirect funds to their wallets instead of the intended recipients. 

    In this campaign, we observed the malware infection progressing through several stages. Upon downloading the file from these phishing sites, it arrives as a zip file containing a malicious executable serving as a dropper. This dropper then proceeds to drop a VB Script and a Batch script file onto the system.