Was just browsing when I saw this news, regarding malicious and fake anti-virus sites. Of course, you will question, why it is related to crypto?, the answer is that because one of the tenant for being a crypto enthusiast so that we will not get phished by malwares that can still our crypto assets is to make sure that our anti-virus is updated.
But what if the attack is on the anti-virus itself like the following?
avast-securedownload.com (Avast.apk)
bitdefender-app.com (setup-win-x86-x64.exe.zip)
malwarebytes.pro (MBSetup.rar)
And as you can see in the images, it's hard to see that this is a malicious sites and not the real one.
1. The site hosting "avast-securedownload . com" is a spyware and a stealer,
2. While the "bitdefender-app. com" has been injected with
Lumma.Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.
3. While "malwarebytes. pro" has a payload of
StealC.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.
https://www.trellix.com/blogs/research/a-catalog-of-hazardous-av-sites-a-tale-of-malware-hosting/
So now it begs the question that if we are in crypto space, we should really be alert on everything we click and downloaded, even anti-virus software because we could be trick by going into this kind of websites and we thought that we are safe.
And also that we are about to hit the bull run, the cyber criminals activity are ramping up their activity against us. So be very very careful everyone.