Botnet steals half a million dollars in cryptocurrency from victims

2 years ago 443

The botnet uses a maneuver called crypto clipping, which relies connected malware to bargain cryptocurrency during a transaction, says Check Point Research.


Image: iStock/bagotaj

Botnets are a fashionable instrumentality utilized by cybercriminals to power a web of compromised machines for malicious purposes. And arsenic botnets get much sophisticated, the level of harm they tin inflict grows. A caller botnet variant discovered by cyber menace quality supplier Check Point Research employs a unsocial method to bargain cryptocurrency from its victims.

SEE: Identity theft extortion policy (TechRepublic Premium)

In a blog station published Thursday, Check Point said that it found a caller variant of the Phorpiex botnet, celebrated for sextortion and crypto-jacking attacks. Known arsenic Twizt, the variant has already stolen astir fractional a cardinal dollars successful cryptocurrency implicit a year, mostly from radical successful Ethiopia, Nigeria and India.

From November 2020 to November 2021, Phorpiex bots hijacked 969 cryptocurrency transactions, grabbing 3.64 Bitcoin ($179,000), 55.87 successful Ethereum ($227,000), and $55,000 successful ERC20 tokens. In its astir profitable attack, the botnet snagged 26 successful Ethereum ($105,000).

Once deployed, Twizt fundamentally acts connected its ain without immoderate progressive bid and power servers, which means the botnet tin automatically widen its nett by skirting past accepted information defenses. As a effect of the botnet's latest features, Check Point believes it whitethorn go adjacent much unchangeable and much dangerous.


Victims of Twizt by country

Image: Check Point Research

To prey connected crypto currency traders during an existent transaction, Twizt uses a method called "crypto clipping." Here, the botnet employs malware that automatically replaces the intended wallet code with the code of the cybercriminal, truthful the funds are unknowingly hijacked.

"There are 2 main risks progressive with the caller variant of Phorpiex," said Alexander Chailytko, cyber information probe & innovation manager astatine Check Point Software. "First, Twizt is capable to run without immoderate connection with C&C, therefore, it is easier to evade information mechanisms, specified arsenic firewalls, successful bid to bash damage. Second, Twizt supports much than 30 antithetic cryptocurrency wallets from antithetic blockchains, including large ones specified arsenic Bitcoin, Ethereum, Dash, and Monero."

Social engineering: A cheat expanse for concern professionals (free PDF) (TechRepublic)

Recommendations for cryptocurrency traders

Check Point warns that anyone who deals successful cryptocurrency could beryllium affected by Twizt. For that reason, Check Point offers the pursuing tips for cryptocurrency traders:

  1. Double-check the intended wallet address. When you transcript and paste a crypto wallet address, corroborate that the archetypal and pasted addresses are the same.
  2. Try a trial transaction first. Before you nonstop a ample magnitude to idiosyncratic successful cryptocurrency, nonstop a trial transaction with a tiny magnitude to guarantee that the wealth reaches the close person.
  3. Stay updated. Make definite your operating strategy is updated with the latest information patches and don't download bundle from unverified oregon unofficial sources.
  4. Look beyond the ads. When searching for wallets oregon crypto trading and swapping platforms successful the crypto space, look astatine the archetypal existent website successful the hunt results and not astatine immoderate ads that popular up. Check Point discovered that scammers are utilizing Google Ads to bargain crypto wallets.
  5. Scan the URLs. Always double-check the URLs progressive successful immoderate cryptocurrency process oregon transaction.

Cybersecurity Insider Newsletter

Strengthen your organization's IT information defenses by keeping abreast of the latest cybersecurity news, solutions, and champion practices. Delivered Tuesdays and Thursdays

Sign up today

Also see

  • Cryptocurrency glossary: From Bitcoin and Dogecoin to blistery wallets and whales (TechRepublic Premium)
  • New botnet onslaught "puts different IoT botnets to shame" (TechRepublic)
  • How to combat the latest and astir assertive botnets and malware (TechRepublic)
  • Botnets: A cheat expanse for concern users and information admins (TechRepublic)
  • How to debar botnet attacks and different cyberthreats: 4 tips (TechRepublic)
  • IoT botnets: Smart homes ripe for a caller benignant of cyberattack (TechRepublic)
  • Cybersecurity and cyberwar: More must-read coverage (TechRepublic connected Flipboard)
  • Read Entire Article