Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Poisonseed exploits CRM accounts to launch attacks on cryptocurrency poisoning
Global Security

Poisonseed exploits CRM accounts to launch attacks on cryptocurrency poisoning

AdminBy AdminApril 7, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


07 April 2025Red LakshmananCloud security / cryptocurrency

A malicious company named Lone Used compromised accounts related to customer connections management tools (CRM) and voluminous e -mail providers to send spam messages containing seed phrases of cryptocurrencies in an attempt to drain digital purses.

“Main spam recipients are focused on the attack of the poisoning of cryptocurrency,” “Silent impetus” – Note In the analysis. “As part of the attack, Poisonseed provides seed security phrases to force potential victims to copy and insert them into new cryptocurrencies for future compromises.”

Pruousrance goals include entrepreneurial organizations and non -cryptocurrencies. Crypto -Company, such as Coinbase and Ledger, and Volumed Email Suppliers, such as MailChimp, Sendgrid, Hubpot, Mailgun and Zoho, are some of the target crypts.

Cybersecurity

Activities are estimated as different from two poorly aligned threatening subjects Scattered spider and Kryptahameleonwhich are part of a wider cybercrime ecosystem called Com. Some aspects of the company were previously discovered by a security researcher Troy Hunt and A crowning computer Last month.

Attacks include threats that set Phishing Pages for outstanding e -mail aimed at cheating high cost in providing their powers. After receiving the credentials, the opponents continue to create the API key to ensure perseverance, even if the stolen password is dropped by the owners.

In the next step, the operators export the mailing lists, probably using an automated tool and send spam from broken accounts. Posts of spam supply networks after CRM Compromite inform users that they need to set up a new Coinbase wallet using a seed phrase in email.

The ultimate goal of the attacks is to use the same recovery phrase to kidnap and transfer funds from these wallets. The references to the scattered spider and cryptochameleon follow from the use of the domain (“MailChimp -So (.) Com”), which was previously identified as former as well as historical targeting crymeleon kainbaz and glaciers.

What is said, phishing –T Used Poisonseed, does not share any resemblance to those used by two other threat clusters, which causes it to be either a brand new phishing with cryptochameleon, or this is another threat actor that just uses a similar shopping card.

Cybersecurity

Development occurs when a Russian -speaking actor threats is observed using phishing pages located on cloudflare.dev and workters.Dev to provide malware that can remotely control the infected Windows hosts. A preliminary iteration It was found that the company also disseminated the theft of the theft.

“This recent company uses phishing pages with phishing cloudflare, thematic around DMCA (copyright law Digital Millennium) – Note.

“The bait is abusing MS search protocol To download the malicious LNK file, disguised in PDF through double extension. After executing the malicious programs are checked by an attacker working on a telegram raising the victim’s IP address before the transition to the transition Pyramid C2 to manage the infected host. “

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.