Researchers Discover Hidden Malware That Targets Crypto Browser Wallets

Simply put ModStealer employs obfuscated code to infiltrate systems through fake recruitment advertisements. This malware specifically targets browser wallets while masquerading as a background helper. It represents a significant risk to cryptocurrency users and platforms, as reported by decryption sources. A new strain of malware was identified on Thursday, capable of stealing data from crypto […]
Hackers discover a new method to conceal malware in Ethereum smart contracts.

Threat actors have discovered a novel method for delivering malicious software, commands, and links via Ethereum Smart Contracts, successfully evading security scans as tactics surrounding code repositories continue to evolve. Researchers from ReversingLab, a firm specializing in digital asset compliance, have identified a new instance of open-source malware within the Node Package Manager (NPM) repository, […]
Facebook cryptocurrency advertisements result in risky malware scams

New Tattoo Sticker Detects Drink Tampering Korean researchers have developed an innovative solution for ensuring drink safety—a temporary tattoo sticker that detects potential tampering almost instantly. This simple yet effective sticker is designed to be discreet and offers notable protection to users. At first glance, it may just appear like standard skin art, but it’s […]
Fake ads in Facebook crypto scams are spreading harmful malware to users.

Facebook’s true value isn’t just in its social media features; it heavily relies on the user data it gathers. The company capitalizes on this data to generate significant income, primarily by selling it to advertisers who aim to entice us with various products. To be honest, while advertising can sometimes benefit small businesses by connecting […]
SparkKitty mobile malware affects Android and iPhone devices.

Bad actors are constantly on the lookout for personal information, ranging from phone numbers to government IDs. Recently, new threats have emerged that specifically target both Android and iPhone users. A notable malware called Sparkkitty is designed to scan private photos and extract sensitive data like cryptocurrency recovery phrases. What is Sparkkitty Mobile Malware? Researchers […]
ClickFix malware is now aiming at Mac users with deceptive CAPTCHA methods.

Clickfix, a social engineering strategy, has been targeting both Windows and Mac users since early 2024. Recently, researchers uncovered how attackers were manipulating fake Captcha prompts to deceive Windows users into installing malware. Now, a similar approach is being aimed at users in Macau. Cybersecurity analysts have identified a new campaign leveraging Clickfix to distribute […]
FBI alerts about over 1 million smart TVs and streaming devices affected by BadBox malware

Malware can potentially compromise any device that connects to the Internet. This includes mobile phones, tablets, laptops, and even smart TVs and projectors. Recently, the FBI issued a warning that many of these devices—over a million—have been hijacked by malicious actors and turned into involuntary participants in a global cybercrime network. FBI Alert: Over 1 […]
Microsoft takes legal action against Lumma Stealer, a malware that steals information.

Microsoft Takes Action Against Lumma Stealer On Wednesday, Microsoft announced it initiated legal proceedings against Lumma Stealer the previous week. This came about after the company discovered that nearly 400,000 Windows computers had been infected with information-stealing malware over the past couple of months. Lumma Stealer has the capability to extract data from numerous browsers […]
Malware that steals Bitcoin discovered in official printer drivers

Malware Distributed with Printer Drivers Recent reports indicate that a Chinese printer manufacturer has been distributing malware capable of stealing Bitcoin alongside its official drivers. According to China News Outlet Randian News, Procolored, which is situated in Shenzhen, has been using USB drivers to disseminate this software, uploading the compromised drivers to cloud storage for […]
More than 2,800 websites were used to distribute AMOS malware

Ransomware groups that once relied on infected email attachments and fake invoices are adapting their tactics. With users becoming more security-conscious and email gateways improving, these attackers are shifting focus to more subtle schemes. Now, they exploit small checkboxes labeled “I’m not a robot,” which most individuals click without a second thought. A series of […]