![]() ![]() “Malware authors heard the call and responded by creating trojanized Tor browser bundles and distributing them among Russian-speaking users.” ![]() “The Tor Project called to help keep Russian users connected to Tor to circumvent censorship,” said Vitaly Kamluk, head of Kaspersky’s Global Research and Analysis Team for APAC. This made Russians look for alternative places to grab the famed browser from. The researchers believe that Russians were the biggest targets as Tor was first banned and later censored in the country. While the victims are scattered all over the world (52 countries), most of them reside in Russia, followed by Ukraine and the US. ![]() However, due to the way the malware is designed, the researchers cannot be certain about the amount of money stolen and speculate that the final figure is probably even bigger. This method has proven to be quite successful, as attackers have stolen around $400,000 from roughly 16,000 users this year alone. As a result, the victim will send the funds to the wrong address without realizing it. The malware works by replacing the copied address with a different one, which is almost impossible to detect. If it spots one, it will replace it with one controlled by the attacker. ![]() Once extracted and installed, the malware monitors the Windows clipboard for cryptocurrency wallets. The researchers have identified one such executable that is sitting in a password-protected RAR archive. These fake browsers have already managed to rake in around $400,000 in various tokens from unsuspecting victims. Kaspersky cybersecurity researchers have issued a warning to users about fake Tor browsers that are being used by criminals to steal cryptocurrency. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |