Site iconSite icon ForkLog

Cybersecurity Highlights: Malware Targets Binance, Telegram’s New Tools, and More

Cybersecurity Highlights: Malware Targets Binance, Telegram's New Tools, and More

We have compiled the most significant cybersecurity news of the week.

  • Turkish hackers developed malware targeting Binance and MetaMask.
  • Telegram to use IWF tools to combat child pornography.
  • Fake conferencing software emptied Web3 specialists’ wallets.
  • A programmer suspected the FSB of installing spyware on his phone. 

Turkish Hackers Develop Malware Targeting Binance and MetaMask

Researchers at Cleafy discovered Android malware DroidBot, capable of stealing data from 77 cryptocurrency and banking applications. Among the targets:

Developed by Turkish hackers, the trojan disguises itself as Google Chrome, Google Play Store, or Android Security. Its functionality includes keylogging, overlaying, SMS interception, and a VNC module for remote control of the infected device.

A key aspect of DroidBot’s operation is the abuse of Android accessibility services to monitor user actions and simulate swipes and taps on behalf of the malware.

The malware has been active since June 2024, offering builders to third-party operators for $3000 a month with customization options for specific targets.

DroidBot builder. Data: Cleafy. 

Analysis of one botnet revealed 776 unique infections in the UK, Italy, France, Turkey, Portugal, and Germany. 

The malware is in an intensive development stage, expanding its geographical attack range.

Telegram to Use IWF Tools to Combat Child Pornography

The British Internet Watch Foundation (IWF) will provide Telegram with tools for the proactive detection and removal of child sexual abuse images under an agreement.

This includes the organization’s databases and a service for collecting “hashes”—unique digital fingerprints of known illegal images and videos. Additionally, IWF will directly report criminal content found in public parts of Telegram, including AI-generated material.

The foundation combats the spread of child sexual abuse images online through partnerships with law enforcement, governments, the public, and internet companies worldwide. It often faces criticism for generating excessive false complaints, secrecy, and ineffective technical solutions. 

Fake Conferencing Software Emptied Web3 Specialists’ Wallets

Researchers at Cado Security Labs discovered the Meeten malware for stealing cryptocurrency, disguised as a conferencing application. The attacks target Web3 sector workers.

The campaign began in September 2024. The brand name of the fake application changed multiple times, but for each, hackers created official websites and social media accounts filled with AI-generated content. 

Data: Cado Security Labs.

The malware has Windows and macOS versions. Once on a computer, it transmits to hackers:

Moreover, the sites are equipped with a script requesting a crypto wallet connection, allowing asset theft before the software is actually downloaded.

Germany Shuts Down Two Darknet Marketplaces and Encrypted Messenger

German authorities shut down the servers of the country’s largest darknet marketplace, Crimenetwork, and arrested its technical administrator. Since 2012, the platform traded in stolen data, drugs, and forged documents. It had over 100,000 users and more than a hundred sellers.

According to law enforcement, from 2018 to 2024, transactions on Crimenetwork exceeded 1000 BTC and 20,000 Monero (€93 million or ~$98 million at the time of writing). The operators’ commission profit was at least $5 million.

Data: BKA.

The 29-year-old admin of Crimenetwork was arrested, charged with running a criminal platform and drug trafficking. Authorities seized luxury cars and cryptocurrencies worth about €1 million.

Additionally, Germany halted the operations of the darknet marketplace Manson Market, which sold stolen account and payment data, as well as personal information. These details were obtained through a network of phishing online stores. At least 57 victims suffered losses exceeding €250,000. 

The investigation team seized 50 servers and over 200 TB of documents with evidence of criminal activity. More than 80 storage devices, mobile phones, computers, as well as cash and cryptocurrencies worth €63,000 were confiscated. Two suspected operators of Manson Market were arrested in Germany and Austria. 

Another operation coordinated by Europol led to the shutdown of the encrypted messaging platform Matrix. It facilitated illegal activities for at least 8,000 users in 33 languages worldwide. The service allowed encrypted video calls, transaction tracking, and anonymous web browsing.

Forty servers were disabled in France and Germany, and five suspects were arrested in Spain and France. One of them, a 52-year-old Lithuanian citizen, is believed to be the owner and main operator of Matrix.

Data: Europol.

Authorities seized 970 encrypted phones, €145,000 ($152,500) in cash, €500,000 ($525,000) in cryptocurrencies, and four vehicles.

CP3O Admits to Illegal Cryptocurrency Mining Worth $1 Million

Nebraska resident Charles O. Parks III, known as CP3O, admitted to using cloud computing services for cryptocurrency mining. The affected companies are presumably Amazon and Microsoft.

According to the case materials, from January to August 2021, CP3O mined Ethereum, Litecoin, and Monero worth approximately $970,000 from various accounts. He did not pay the $3.5 million bill for provider services.

Parks was arrested in April and faces up to 20 years in prison. 

Teen Arrested in the US for Alleged Hacks on Gemini and KuCoin Clients

US authorities arrested 19-year-old Remington Goy Oglethorpe, linked to the cybercriminal group Scattered Spider. He is accused of hacking an American financial institution and two unnamed telecommunications companies.

According to the investigation, the hacker, known as remi, breached internal networks through phishing employees of targeted organizations. By posing as benefits providers, schedule change requests, or HR inquiries, he tricked them into visiting malicious sites and entering login credentials for work computers. 

From October 2023 to May 2024, Oglethorpe, after gaining access to telecom systems, sent over 8.6 million phishing SMS to steal recipients’ cryptocurrency. Some of these attacks targeted clients of the Gemini and KuCoin exchanges.

During a search of the hacker’s home, his iPhone contained screenshots of phishing messages, credential collection pages, and crypto wallets with tens of thousands of dollars in digital currencies.

Programmer Suspects FSB of Installing Spyware on His Phone 

Citizen Lab specialists examined the mobile phone of a Russian programmer, which was confiscated by FSB officers during a 15-day arrest, and found secretly installed spyware. The malware posed as a legitimate Android app, Cube Call Recorder.

The program had unlimited access to the device through a wide range of permissions. Its features included:

Citizen Lab believes the malware is a new version of the Monokle spyware, developed by employees of the Special Technology Center LLC in St. Petersburg.

Also on ForkLog:

What to Read Over the Weekend?

We explain the types of cryptocurrency pyramids and what attracts people to them.

Exit mobile version