Blackberry Detects Malware Targeting Crypto Industry
Blackberry has identified multiple malware families used in campaigns to steal cryptocurrency from devices. The company’s cybersecurity solutions stopped over 1.5 million attacks between March and May 2023, with the finance, healthcare, and government sectors being the most targeted industries.
Key Points:
- Attackers are using a variety of tools to evade defensive controls, focusing on legacy solutions that rely on signatures and hashes.
- Commodity malware like ‘RedLine’ is being used to extract sensitive information, including credentials, credit card details, and cryptocurrency data.
- ‘SmokeLoader’ is a popular malware family that has been used to distribute various types of malware since 2011, including ransomware, infostealers, crypto miners, and banking Trojans.
- ‘RaccoonStealer’ is an infostealer that targets browser cookies, passwords, auto-fill data, and cryptocurrency wallet information. It is available as Malware-as-a-Service on dark web forums.
- Linux operating systems are actively targeted for cryptocurrency mining, while macOS users face threats from an infostealer called ‘Atomic macOS’.
Hot Take:
Blackberry’s report highlights the ongoing threat of malware to the crypto industry. With attackers constantly evolving their tactics, it is crucial for individuals and organizations to prioritize cybersecurity measures to protect their assets and sensitive information.