2019-1-30 20:05 |
Since cryptocurrency was first introduced about a decade ago, cyber theft and malware became another branch of the financial system. Things have become so bad to the extent that as long as there is cryptocurrency lying somewhere, there will always be someone seated in a dark room thinking of clever ways to steal it from its rightful owners.
Latest Threat to Crypto AssetsThe Razy Trojan has become the latest threat to crypto-related assets. This is a malware that is normally distributed via advertising banners, websites, and free file hosting services. Many of these services often disguise themselves to appear like legitimate and trustworthy software that can be trusted by the users.
This particular malware can be installed in various browser extensions, with many of the popular browsers, e.g., Yandex, Firefox, Mozilla, and Google Chrome is affected. Once the virus is installed in your machine, it automatically disables the updates and then goes ahead to pass the integrity checks required for it to proceed ahead.
Once it has been installed in a machine, it sets its sights on your cryptocurrency assets by filtering through websites associated with known digital wallets. When it comes across such addresses, it begins replacing all of them with those being operated by the people behind the malware.
Razy—the Sneaky MalwareThis latest threat has proven to be very sneaky as it is also able to impersonate any QR code that may point towards the presence of a digital asset wallet. In addition, it also has the capacity to alter web pages belonging to digital currency exchanges. Once altered, the page is then replaced with one recommending that users install new features released by the exchange.
Crypto enthusiasts also need to be aware of the fact that Razy malware is also capable of changing or mixing up the search results posted on popular search engines such as Google. The main reason for this is to trick the computer user to visit the website or examine files that have already been infected with viruses and other malware.
Cybersecurity experts have come to the conclusion that this new malware is very similar to other malware that was discovered last year in July. The malware in question was discovered by Fortinet—a security firm. The firm came to the realization that the malware was actively modifying the targets clipboards and replacing the available addresses with those belonging to the hackers.
Later on in the year, security researchers were able to uncover another malware going by the name of Dark Gate. Unlike the others, this particular malware was able to steal digital assets from its victims without the owners ever realizing that their digital wallets had been emptied out.
Many cybersecurity professionals now claim that people who want to protect themselves against the new threat will have no option but to start using the defense strategies employed by artificial intelligence systems. This refers to the use of artificial intelligence to stop or shift attacks powered by AI.
origin »Global Cryptocurrency (GCC) на Currencies.ru
![]() ![]() ![]() ![]() ![]() ![]() |