BTC $59315.5545
ETH $2982.0893
BNB $565.3287
SOL $137.0518
XRP $0.5169
stETH $2981.6323
DOGE $0.1326
TON $5.2673
ADA $0.4485
AVAX $33.5634
TRX $0.1221
wstETH $3474.0183
DOT $7.0685
WETH $2978.9793
WBTC $59304.0914
BCH $435.2054
LINK $13.6737
MATIC $0.7234
UNI $7.0296
ICP $13.0013
LTC $80.0206
DAI $1.0007
IMX $2.2248
FDUSD $1.0001
CAKE $2.5439
RNDR $7.7232
ETC $25.6847
NEAR $6.1622
HBAR $0.1031
MNT $0.9886
FIL $5.8793
PEPE $0.0000
STX $2.0492
OKB $48.6193
ATOM $8.7289
WIF $2.8058
TAO $395.0891
VET $0.0351
MKR $2710.3111
KAS $0.1044
GRT $0.2492
USDE $0.9988
XMR $122.7042
AR $34.4960
XLM $0.1091
FET $1.9731
INJ $23.1264
BTC $59315.5545
ETH $2982.0893
BNB $565.3287
SOL $137.0518
XRP $0.5169
stETH $2981.6323
DOGE $0.1326
TON $5.2673
ADA $0.4485
AVAX $33.5634
TRX $0.1221
wstETH $3474.0183
DOT $7.0685
WETH $2978.9793
WBTC $59304.0914
BCH $435.2054
LINK $13.6737
MATIC $0.7234
UNI $7.0296
ICP $13.0013
LTC $80.0206
DAI $1.0007
IMX $2.2248
FDUSD $1.0001
CAKE $2.5439
RNDR $7.7232
ETC $25.6847
NEAR $6.1622
HBAR $0.1031
MNT $0.9886
FIL $5.8793
PEPE $0.0000
STX $2.0492
OKB $48.6193
ATOM $8.7289
WIF $2.8058
TAO $395.0891
VET $0.0351
MKR $2710.3111
KAS $0.1044
GRT $0.2492
USDE $0.9988
XMR $122.7042
AR $34.4960
XLM $0.1091
FET $1.9731
INJ $23.1264
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Errors in domain names cause website visitors to become infected with malware


    Experts from Cyble and BleepingComputer report an ongoing malware campaign using a network of over 200 domains imitating 27 brands that coerces users into downloading malware for Windows and Android.

    According to the Cyble report, the domains in this campaign are created using the "typosquatting" technique and impersonate popular Android app stores - Google Play, APKCombo and APKPure, as well as download portals for PayPal, VidMate, Snapchat and TikTok.

    Some of the domains used for this purpose are:

    • payce-google[.]com - impersonates Google Wallet;
    • snanpckat-apk[.]com impersonates Snapchat;
    • vidmates-app[.]com - impersonates VidMate;
    • paltpal-apk[.]com - impersonates PayPal;
    • m-apkpures[.]com - impersonates APKPure;
    • tlktok-apk[.]link - simulates the download portal for the TikTok app.

    On all domains, APK files are delivered by ERMAC malware, a banking Trojan that targets bank accounts and cryptocurrency wallets from 467 apps.

    In addition, experts at BleepingComputer discovered a larger campaign from the same operators that distributes malware for Windows. This campaign consists of over 90 sites impersonating over 27 popular companies to distribute malware, steal cryptocurrency recovery keys, and distribute Android malware.

    One of the malicious sites offers to download the popular text editor Notepad++. The files from this site install the Vidar Stealer infostealer, which has been increased in size to 700 MB to avoid analysis. Another site is impersonating the Tor project using the "tocproject.com" domain. In this case, the website delivers Agent Tesla spyware and the RAT Trojan.

    Many sites target cryptocurrency wallets and user seed phrases, for example, the site "ethersmine[.]com" tries to steal the visitor's Ethereum seed wallet.

    The attackers use multiple variants of each domain to exploit as many typos as possible, so these domains are only a small part of the entire network of domains used in the campaign.

    Author DeepWeb
    Australian Capital Region first to decriminalize hard drugs
    Critical vulnerability in MoveVM could compromise Aptos blockchain

    Comments 0

    Add comment