Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Crypto Scam app disguised as WalletConnect steals $70K in five-month campaign
Global Security

Crypto Scam app disguised as WalletConnect steals $70K in five-month campaign

AdminBy AdminSeptember 28, 2024No Comments4 Mins Read
Crypto Scam App
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 28, 2024Ravi LakshmananCryptocurrency / Mobile Security

Crypto Scam App

Cybersecurity researchers discovered a malicious Android app in the Google Play Store that allowed threat actors to steal approximately $70,000 in cryptocurrency from victims over a period of nearly five months.

The malicious program identified by Check Point appeared to be legitimate WalletConnect open source protocol to force unsuspecting users to download it.

“Fake reviews and consistent branding have helped the app get over 10,000 downloads, ranking high in search results,” the cybersecurity firm said. said in the analysis, adding that this is the first time a cryptocurrency drain program has targeted mobile users exclusively.

More than 150 users are estimated to have fallen victim to the scam, although it is believed that not all users who downloaded the app were affected by the cryptocurrency leak.

Cyber ​​security

The campaign involved distributing a fraudulent app under several names, such as “Mestox Calculator”, “WalletConnect – DeFi & NFT” and “WalletConnect – Airdrop Wallet” (co.median.android.rxqnqb).

Although the app is no longer available for download from the official app market, data from SensorTower shows that it was popular in Nigeria, Portugal and Ukraine and related to the said developer USA FOX.

The developer was also linked to another Android app called “Uniswap DeFI” (com.lis.uniswapconverter), which remained active on the Play Store for about a month from May to June 2023. It is currently unknown whether the app contained any malicious features.

Crypto Scam App

However, both apps can be downloaded from third-party sources in the app store, which once again highlights the risks associated with downloading APK files from other marketplaces.

Once installed, the WallConnect spoof is designed to redirect users to a fake website based on their IP address and User-Agent string, and if so, redirects them a second time to another website impersonating Web3Inbox.

Users who do not meet the required criteria, including those visiting the URL from a desktop web browser, are redirected to a legitimate website to avoid detection, effectively allowing threat actors to bypass the Play Store app review process.

In addition to taking measures to prevent analysis and debugging, the main component of the malware is a cryptocurrency drainer, known as MS Drainer, which prompts users to connect their wallet and sign several transactions for the wallet to be verified.

Crypto Scam App

The information entered by the victim at each step is transmitted to the control server (cakeserver(.)online), which in turn sends a response containing instructions to initiate malicious transactions on the device and transfer funds to a wallet address owned by the attackers.

“Similar to stealing one’s own cryptocurrency, the malicious app first tricks the user into signing a transaction in their wallet,” Check Point researchers said.

“With this transaction, the victim authorizes the attacker’s address 0xf721d710e7C27323CC0AeE847bA01147b0fb8dBF (the ‘Address’ field in the configuration) to transfer the maximum amount of the specified asset (if allowed by her smart contract).”

In the next step, tokens from the victim’s wallet are transferred to another wallet (0xfac247a19Cc49dbA87130336d3fd8dc8b6b944e1) controlled by the attacker.

Cyber ​​security

This also means that if the victim does not revoke permission to withdraw tokens from their wallet, attackers can continue to withdraw digital assets as soon as they appear without requiring any further action.

Check Point said it also discovered another malicious app with similar features, “Walletconnect | Web3Inbox” (co.median.android.kaebpq), which was previously available on the Google Play Store in February 2024. It has been downloaded more than 5,000 times.

“This incident highlights the growing sophistication of cybercriminals’ tactics, particularly in the field of decentralized finance, where users often rely on third-party tools and protocols to manage their digital assets,” the company said.

“The malware did not rely on traditional attack vectors such as permissions or keylogging. Instead, it used smart contracts and deep links to silently spend assets when users were tricked into using the app.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.