Cryptocurrency

Malware alert! Crypto trading firms are under attack

A Trojan-style malware is attacking Israeli fintech and cryptocurrency trading firms in an attempt to get revenge. This Cardinal RAT malware was also spotted several years ago in 2017 and went largely undetected for almost two years. It appears that the virus has returned and is going after the cryptocurrency trading firms again.

What the virus did before, was to enter into the computer using a downloader called Carp and uses Microsoft Excel’s documents to compile the source code into a program which then deploys the malware into the system.

However, the updated version of the malware has resurfaced which is evading “detection and hinder analysis”, according to the researchers from Palo Alto Networks’ Unit 42, an American multinational cybersecurity company.

See Also: Impostors pose as CIA agents to steal Bitcoins in new blackmail scheme

The latest version of the Cardinal RAT virus applies a number of techniques to go through the analyzing systems undetected and making it more difficult to find it. One of the techniques include steganography, it refers to a class of programming approach that are used to obscure messages, files, and other important data.

The virus is loaded into the victim’s computer through the data embedded into a Bitmap (BMP) image file during installation. It looks harmless from the surface but when the image is opened, the embedded code decodes itself and initiate the attack.

The malware steals your passwords, usernames, and other sensitive data which then it sends back to the malware operators giving them the power to steal your cryptocurrency.

According to the report from Unit 42, the malware operators perform the following actions;

  • Collect victim information
  • Update settings
  • Act as a reverse proxy
  • Execute command
  • Uninstall itself
  • Recover passwords
  • Download and Execute new files
  • Keylogging
  • Capture screenshots
  • Update Cardinal RAT
  • Clean cookies from browsers

Two Cardinal RAT attacks have been observed since 2017, and according to Unit 42 both times the victims were fintech companies based in Israel. A total of 13 reports have been received until now, which include nine from Israel, two from the US and one each from Austria and Japan.

Sponsored
Faisal Saeed

Share
Published by
Faisal Saeed

Recent Posts

MoITT Opens Applications for Key Member IT Position (MP-1 Scale)

The Ministry of Information Technology and Telecommunications (MoITT) is currently accepting applications for the post…

4 hours ago

Apple’s iOS Updates Enhance Call Quality with Voice Isolation and Wide Spectrum

Apple's recent iOS updates are revolutionizing the quality of phone conversations by introducing features that…

5 hours ago

Samsung Criticizes Apple Fans Again, Calling Them iSheep

Once again, Samsung has launched a campaign that makes fun of Apple and its customers.…

6 hours ago

Google Play Store to Introduce Alerts for Low-Quality Apps

The Google Play Store is currently working on a new feature that is designed to…

8 hours ago

Punjab Announces Winter Vacations Starting December 20

LAHORE: Khalid Nazir Wattoo, Punjab's Secretary for Schools, announced on Monday that the winter break…

8 hours ago

NCERT Advisory Warns of Konfety Group Targeting Android Users with Malicious Apps

The National Computer Emergency Response Team (nCERT) has issued an advisory to Android users worldwide…

8 hours ago