Binance Square
LIVE
LIVE
Bu_Alee
--28 views
Threat actors are using fake #Facebook job ads to fool victims into installing Ov3r_Stealer, a new Windows-based stealer virus. Ov3r_Stealer is designed to extract IP address-based location, hardware details, passwords, cookies, credit card info, auto-fills, browser extensions, crypto wallets, Microsoft Office documents, and a list of antivirus products from the infected host. The campaign’s motive remains unclear; however, stolen data is often sold to other threat actors. Ov3r_Stealer may also be modified to deploy malware and other payloads, such as QakBot. The attack initiates with a malicious PDF file seemingly hosted on OneDrive, enticing users to click on an “Access Document” button. Trustwave discovered the PDF file posted on a fake Amazon CEO Andy Jassy Facebook account and Facebook advertisements promoting digital advertising opportunities. Upon clicking the button, users are directed to a .URL file pretending to be a DocuSign document hosted on Discord’s CDN. A control panel item (.CPL) file is delivered through the shortcut file and executed by the Windows Control Panel process binary (“control.exe”). Executing the CPL file triggers a PowerShell loader (“DATA1.txt”) retrieval from GitHub to execute Ov3r_Stealer. #BewareOfScams #TrendingTopic #SafetyTips

Threat actors are using fake #Facebook job ads to fool victims into installing Ov3r_Stealer, a new Windows-based stealer virus.

Ov3r_Stealer is designed to extract IP address-based location, hardware details, passwords, cookies, credit card info, auto-fills, browser extensions, crypto wallets, Microsoft Office documents, and a list of antivirus products from the infected host.

The campaign’s motive remains unclear; however, stolen data is often sold to other threat actors. Ov3r_Stealer may also be modified to deploy malware and other payloads, such as QakBot.

The attack initiates with a malicious PDF file seemingly hosted on OneDrive, enticing users to click on an “Access Document” button.

Trustwave discovered the PDF file posted on a fake Amazon CEO Andy Jassy Facebook account and Facebook advertisements promoting digital advertising opportunities.

Upon clicking the button, users are directed to a .URL file pretending to be a DocuSign document hosted on Discord’s CDN. A control panel item (.CPL) file is delivered through the shortcut file and executed by the Windows Control Panel process binary (“control.exe”).

Executing the CPL file triggers a PowerShell loader (“DATA1.txt”) retrieval from GitHub to execute Ov3r_Stealer.

#BewareOfScams #TrendingTopic #SafetyTips

Avertissement : comprend des opinions de tiers. Il ne s’agit pas d’un conseil financier. Consultez les CG.
0
Découvrir du contenu pour vous
Inscrivez-vous dès maintenant pour avoir une chance de gagner 100 USDT de récompenses !
ou
S’inscrire comme entité
ou
Connexion
Créateur pertinent

Découvrez-en plus sur le créateur

--
Here’s How Much Crypto Scammers Drained From Victims in January Alone The top seven victims collectively lost $17 million due to phishing signatures like ERC20 Permit, Create2, increaseAllowance, and Swap. According to Scam Sniffer, scammers stole $55 million worth of cryptocurrency in January alone and set up more than 11,000 phishing websites. Notably, most of these thefts occurred on the Ethereum $ETH mainnet, with Arbitrum$ARB , BNB $BNB , Optimism, and Polygon closely behind. Crypto Phishing Attacks Surged in January In a recent Feb. 9 thread on X, Scam Sniffer highlighted a concerning trend observed in January, noting a surge in phishing attacks coinciding with heightened activity within crypto communities following a series of airdrops in the previous month. These scams, often occurring alongside airdrops and other project activities, have impacted around 40,000 individuals. According to Scam Sniffer, fraudsters created the phishing websites in January, impersonating various projects such as Manta Network, Frame, SatoshiVM, AltLayer, Dymension, zkSync, Pyth, OpenSea, Optimism, Blast, and others. Their efforts proved successful, with the top seven victims losing $17 million in total owing to phishing signatures such as ERC20 Permit, Create2, increaseAllowance, and Swap. Scam Sniffer reported that hackers commonly exploited the ERC-20 Permit function, tricking users into unknowingly transferring funds from their non-custodial wallets under the guise of legitimate operations. Many individuals fell victim to these scams due to cybercriminals actively posting fake comments on various platforms, posing as legitimate projects like Optimism and zkSync. Crypto Cyberattacks Hit $2 Billion in 2023 Throughout 2023, scammers and hackers executed numerous cyberattacks and rug pulls, resulting in the theft of $1.9 billion worth of cryptocurrency, as reported earlier by CryptoPotato. #TrendingTopic #SCAMalerts #SafetyTips
--
Binance Joins Forces with INTERPOL to Boost Cybersecurity Worldwide Binance, a key player in the cryptocurrency exchange realm, has been actively engaged in fortifying global cybersecurity measures. Throughout 2023, the company’s specialized teams orchestrated an array of educational events, hosting over 120 seminars, workshops, and training sessions. These initiatives were designed to provide law enforcement professionals with comprehensive insights into the intricacies of the crypto landscape, equipping them with the necessary skills to combat emerging threats. Looking ahead to 2024, Binance reaffirms its dedication to bolstering cybersecurity efforts, emphasizing a proactive approach to staying ahead of evolving cyber threats and ensuring the security of the digital ecosystem. In a bid to enhance cybersecurity on a global scale, Binance has forged a strategic collaboration with INTERPOL. Recent endeavors include hosting a virtual session aimed at fostering dialogue and knowledge exchange among law enforcement officers. Representatives from INTERPOL emphasized the importance of collaborative partnerships with industry leaders like Binance, highlighting the need for effective strategies to combat cybercrime. Jarek Jakubcek, Head of Law Enforcement Training at Binance, emphasized the company’s commitment to proactive cybersecurity measures, underscoring collaboration as a cornerstone of its approach. By leveraging its expertise and resources, Binance aims to play a pivotal role in shaping a safer digital landscape, combatting cyber threats, and mitigating cryptocurrency-related crimes. #Breaking #BinanceSqaure #CyberSecurityAnalysis #TrendingTopic
--

Dernières actualités

Voir plus
Plan du site
Cookie Preferences
CGU de la plateforme