Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » PyPI repository found hosting fake crypto wallet recovery tools that steal user data
Global Security

PyPI repository found hosting fake crypto wallet recovery tools that steal user data

AdminBy AdminOctober 2, 2024No Comments4 Mins Read
Fake Crypto Wallet Recovery Tools
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 2, 2024Hacker newsSupply Chain Attack / Cryptocurrency

Tools to recover fake crypto wallets

A new set of malicious packages was discovered in the Python Package Index (PyPI) repository, which masqueraded as cryptocurrency wallet recovery and management services with the sole purpose of exfiltrating sensitive data and facilitating the theft of valuable digital assets.

“The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus and other prominent wallets in the crypto ecosystem,” said Checkmarx researcher Yehuda Gelb. said in Tuesday’s analysis.

“Positioning themselves as utilities for extracting mnemonic phrases and decrypting wallet data, these packages appeared to offer valuable functionality for cryptocurrency users involved in recovery or wallet management.”

Cyber ​​security

However, they contain functionality to steal private keys, mnemonic phrases, and other sensitive wallet data such as transaction history or wallet balance. Each of the packages attracted hundreds of downloads before they were taken down –

Checkmarx said the packages were named as such in a deliberate attempt to attract developers working in the cryptocurrency ecosystem. In a further attempt to lend legitimacy to the libraries, package descriptions on PyPI were accompanied by installation instructions, usage examples, and in one case even “best practices” for virtual environments.

Tools to recover fake crypto wallets

The scam didn’t stop there, as the threat actor behind the campaign also managed to display fake download statistics, giving users the impression that the packages are popular and trustworthy.

Six of the identified PyPI packages included a dependency called cipherbcryptors to execute malicious code, while several others relied on an additional package called ccl_leveldbases in an apparent attempt to obfuscate the functionality.

A distinctive aspect of the packages is that the malicious functionality is only triggered when certain functions are called, marking a denture from a typical template where such behavior is activated automatically on installation. The received data is then transmitted to a remote server.

“The attacker used an extra layer of security by not hard-coding the address of his management server in any of the packets,” Gelb said. “Instead, they used external resources to dynamically retrieve this information.”

This technique, so-called dead drop resolutionallows attackers to update server information without having to update the packages themselves. It also eases the process of migrating to another infrastructure in the event of a server shutdown.

Cyber ​​security

“The attack exploits the trust in open source communities and the apparent utility of wallet management tools, potentially affecting a wide range of cryptocurrency users,” Gelb said.

“The complexity of the attack – from its deceptive packaging to its dynamic malicious capabilities and exploiting malicious dependencies – underscores the importance of comprehensive security measures and constant monitoring.”

This development is just the latest in a series of malicious campaigns targeting the cryptocurrency sector, where threat actors are constantly looking for new ways to siphon funds from victims’ wallets.

The PyPI repository

In August 2024, details emerged of a sophisticated cryptocurrency scam called CryptoCore, which involves using fake videos or hacked accounts on social media platforms such as Facebook, Twitch, X and YouTube to lure users into parting with their cryptocurrency assets under the guise of a quick and easy profit.

“This fraud group and its distribution companies use deepfake technology, hacked YouTube accounts, and professionally designed websites to trick users into sending their cryptocurrencies to scammers’ wallets,” — Martin Chlumecki, Avast researcher. said.

“The most common method is to convince a potential victim that messages or events posted online are official messages from a trusted social media account or event page, thereby maintaining the credibility associated with the chosen brand, person or event” .

Then last week, Check Point shed light on a rogue Android app that impersonated the legitimate open-source WalletConnect protocol to steal approximately $70,000 in cryptocurrency by initiating fraudulent transactions from infected devices.

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.