Found new malware that attacks cryptocurrency companies

Found new malware attacking cryptocurrency companies. The discovery may have affected mainly the plans of some Israeli companies.

New malware found attacking cryptocurrency companies - cryptocurrency1 1024x709

Hacking e malware they have always been a major concern of the cryptocurrency ecosystem. And recently a new malware has been identified, Remote Access Trojan, which allows full remote control of a device. The trojan it works in silence, collecting all the target data, and then deleting its presence from the device by completely uninstalling the applications. Of course, before doing this the malware steals data, storing keystrokes and sending stolen items over the Internet.

The researchers also suggested that, in terms of the mode of operation and capacity, the new one RAT malware it does not differ significantly from the original. When RAT enters a victim's computer, therefore, it quickly steals vital data, updates its settings, acts as a reverse proxy and executes malicious commands before permanently deleting itself. That's not all: once the above processes have been completed, the malware skilfully switches to recovering the victim's passwords, downloads and executes files, records keystrokes, takes screenshots, updates itself automatically and deletes all cookies on the browser of the user.

But what connections are there with cryptocurrency? Unfortunately, in a blog post, cyber security firm Palo Alto Networks revealed that some Israeli fintech and cryptocurrency currency trading companies have been affected by malware since 2017.

Although the details of the two companies that make software for the Forex and Cryptocurrency trading companies have not yet been revealed, and will probably remain secret, the implications of this malware attack can be very harmful, due to the main operations of the platform, such as example the fact that customer information has been stored on their devices. In a statement to thenextweb, researchers who discovered the malware indicated that by means of recall documents attached to spam messages sent to people who were thought to be operating as cryptocurrency traders, the files could independently find their way.