BluStealer malware steals cryptocurrency and spreads through phishing emails

Avast analysts talked about a malicious spam campaign spreading BluStealer malware that steals cryptocurrency.

This info-stealer is designed topullBitcoin, Ethereum, Monero and Litecoin) from popular walletsArmoryDB, Bytecoin, Jaxx Liberty, Exodus, Electrum, Atomic, Guarda and Coinomi.

In total, experts tracked more than 12,000 phishing emails around the world.

phishing emails

In mid-September, 這 Avast Threat Intelligence team recorded a surge in malicious activityphishing emails using the names of the shipping company DHL and the Mexican metallurgical company General de Perfiles, and distributing the BluStealer 惡意軟件.

example of a phishing email
An example of a phishing email

通常, in such messages it is said that a certain parcel was delivered to the head office of the company due to the absence of the recipient on the spot. 下一個, the recipient is asked to fill out the attached document in order to transfer the delivery. When the user tries to open it, the BluStealer installation starts.

In phishing campaigns associated with General de Perfiles, recipients receive emails stating that they have overpaid their bills and that some credit has been saved for them, which will be included in the invoice of the next purchase. As in the campaign imitating DHL, the General de Perfiles message contains BluStealer as an attachment.

The countries most affected by BluStealer are Russia, Turkey, USA, Argentina, UK, Italy, Greece, Spain, France, Japan, India, Czech Republic, Brazil and Romania. 所以, Russian users received 139 such letters.

A large number of malware samples studied by Avast belonged to one specific campaign, which was identified by the unique .NET downloader. 例如, spam messages contained .iso attachments and download URLs. These attachments contain executable malware files packaged using the mentioned .NET loader.

BluStealer combines the functionality of a keylogger and document downloader, and also steals cryptocurrency: it can steal data from cryptocurrency wallets, such as private keys and credentials, as a result of which the victim can lose access to their assets.Avast researchers say.
BluStealer is also able to detect cryptocurrency addresses copied to the clipboard and replace them with those previously set by the cybercriminals. As a result, the cryptocurrency ends up in the hands of cybercriminals, and not where the transfer was actually made.

Let me remind you that I also told that BulletProofLink Cybercrime Offers Phishing as a Service.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕