Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Poisonseed exploits CRM accounts to launch attacks on cryptocurrency poisoning
Global Security

Poisonseed exploits CRM accounts to launch attacks on cryptocurrency poisoning

AdminBy AdminApril 7, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


07 April 2025Red LakshmananCloud security / cryptocurrency

A malicious company named Lone Used compromised accounts related to customer connections management tools (CRM) and voluminous e -mail providers to send spam messages containing seed phrases of cryptocurrencies in an attempt to drain digital purses.

“Main spam recipients are focused on the attack of the poisoning of cryptocurrency,” “Silent impetus” – Note In the analysis. “As part of the attack, Poisonseed provides seed security phrases to force potential victims to copy and insert them into new cryptocurrencies for future compromises.”

Pruousrance goals include entrepreneurial organizations and non -cryptocurrencies. Crypto -Company, such as Coinbase and Ledger, and Volumed Email Suppliers, such as MailChimp, Sendgrid, Hubpot, Mailgun and Zoho, are some of the target crypts.

Cybersecurity

Activities are estimated as different from two poorly aligned threatening subjects Scattered spider and Kryptahameleonwhich are part of a wider cybercrime ecosystem called Com. Some aspects of the company were previously discovered by a security researcher Troy Hunt and A crowning computer Last month.

Attacks include threats that set Phishing Pages for outstanding e -mail aimed at cheating high cost in providing their powers. After receiving the credentials, the opponents continue to create the API key to ensure perseverance, even if the stolen password is dropped by the owners.

In the next step, the operators export the mailing lists, probably using an automated tool and send spam from broken accounts. Posts of spam supply networks after CRM Compromite inform users that they need to set up a new Coinbase wallet using a seed phrase in email.

The ultimate goal of the attacks is to use the same recovery phrase to kidnap and transfer funds from these wallets. The references to the scattered spider and cryptochameleon follow from the use of the domain (“MailChimp -So (.) Com”), which was previously identified as former as well as historical targeting crymeleon kainbaz and glaciers.

What is said, phishing –T Used Poisonseed, does not share any resemblance to those used by two other threat clusters, which causes it to be either a brand new phishing with cryptochameleon, or this is another threat actor that just uses a similar shopping card.

Cybersecurity

Development occurs when a Russian -speaking actor threats is observed using phishing pages located on cloudflare.dev and workters.Dev to provide malware that can remotely control the infected Windows hosts. A preliminary iteration It was found that the company also disseminated the theft of the theft.

“This recent company uses phishing pages with phishing cloudflare, thematic around DMCA (copyright law Digital Millennium) – Note.

“The bait is abusing MS search protocol To download the malicious LNK file, disguised in PDF through double extension. After executing the malicious programs are checked by an attacker working on a telegram raising the victim’s IP address before the transition to the transition Pyramid C2 to manage the infected host. “

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.