BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • How hackers use Tor to steal crypto

    A team of researchers from Kaspersky Lab has revealed a new campaign aimed at stealing cryptocurrencies. According to the company, cybercriminals use the CryptoClipper Trojan, which is distributed on third-party Internet resources under the guise of the Tor browser. When it enters the system, the program disguises itself as the icon of a popular application, for example, uTorrent, and registers itself in autorun. As soon as the clipper malware finds an address in the clipboard that looks like a crypto wallet, it immediately changes it to one of the addresses belonging to the attacker.

    More than 15,000 users from 52 countries encountered the malicious campaign, with most of the attacks recorded in Russia. The US, Germany, Uzbekistan, Belarus, China, the Netherlands, the UK and France also made it into the top ten countries in terms of the number of victims.

    According to experts, in 2023, more than $400,000 worth of cryptocurrencies were stolen with the help of malware. In addition, the clipper is able to replace the addresses of Bitcoin, Ethereum, Litecoin, Dogecoin and Monero crypto wallets.

    According to the company, the clipper malware is dormant most of the time, making it hard to spot in the system. Most malware requires a communication channel between the operator and the victim's system, but CryptoClipper operates without communication and is completely autonomous. Thus, such programs can stay in the user's system for years, without showing signs of presence, until they reach the goal - to change the address of the victim's crypto wallet.

    Author DeepWeb
    Vulnerability in the underlying Wi-Fi protocol allows attackers to intercept network traffic
    Two-factor authentication and possible ways to bypass it

    Comments 0

    Add comment