{"id":94520,"date":"2026-02-21T07:00:00","date_gmt":"2026-02-21T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=94520"},"modified":"2026-02-21T07:02:03","modified_gmt":"2026-02-21T04:02:03","slug":"stealth-bitcoin-address-swaps-a-sex-toy-makers-data-leak-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/stealth-bitcoin-address-swaps-a-sex-toy-makers-data-leak-and-other-cybersecurity-news\/","title":{"rendered":"Stealth bitcoin address swaps, a sex-toy maker\u2019s data leak, and other cybersecurity news"},"content":{"rendered":"<p>A roundup of the week\u2019s key cybersecurity developments.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Hackers devised a stealthy scheme to swap bitcoin addresses.<\/li>\n<li>A new Android trojan was disguised as IPTV apps.<\/li>\n<li>Trezor and Ledger users received phishing letters by post.<\/li>\n<li>A researcher exposed major firms for tracking Chrome users via extensions.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Hackers devise a stealthy bitcoin address swap<\/h2>\n<p>Criminals have begun quietly substituting bitcoin addresses under the guise of a lucrative crypto-arbitrage deal. The scheme was spotted by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps\/\">BleepingComputer<\/a>.<\/p>\n<p>The campaign hinges on promises of huge profits from a supposed \u201carbitrage vulnerability\u201d on the Swapzone crypto-exchange platform. In reality, the attackers run malicious code that modifies the swap process directly in the victim\u2019s browser.<\/p>\n<p>ClickFix-style attacks usually target operating systems: users are tricked into running PowerShell commands to \u201cfix Windows errors\u201d, leading to the installation of stealers or ransomware. Here, the target is a specific browser session.<\/p>\n<p>According to media reports, this is among the first recorded cases of ClickFix mechanics being used to manipulate web pages for the direct theft of cryptocurrency.<\/p>\n<p>To push the scam, the attackers leave comments under various posts on Pastebin, the popular text (code snippet) hosting service.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"641\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-58217912ec9a5a18-6824502853084525-1024x641.png\" alt=\"image\" class=\"wp-image-275517\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-58217912ec9a5a18-6824502853084525-1024x641.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-58217912ec9a5a18-6824502853084525-300x188.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-58217912ec9a5a18-6824502853084525-768x481.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-58217912ec9a5a18-6824502853084525.png 1491w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: BleepingComputer.<\/figcaption><\/figure>\n<p>They advertise a \u201cleaked hacking manual\u201d that supposedly lets users earn $13,000 in two days, and attach a link. The \u201cguide\u201d in Google Docs describes a way to obtain inflated swap amounts in certain BTC pairs.<\/p>\n<p>BleepingComputer observed that between one and five people were viewing the document concurrently at any given time, suggesting the scheme is active.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"793\" height=\"1024\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-51f8bba733c7bc8c-6824502872793235-793x1024.png\" alt=\"image\" class=\"wp-image-275516\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-51f8bba733c7bc8c-6824502872793235-793x1024.png 793w, https:\/\/forklog.com\/wp-content\/uploads\/img-51f8bba733c7bc8c-6824502872793235-232x300.png 232w, https:\/\/forklog.com\/wp-content\/uploads\/img-51f8bba733c7bc8c-6824502872793235-768x992.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-51f8bba733c7bc8c-6824502872793235.png 1004w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><figcaption class=\"wp-element-caption\">Source: BleepingComputer.<\/figcaption><\/figure>\n<p>The bogus guide tells users to:<\/p>\n<ol class=\"wp-block-list\">\n<li>Go to the Swapzone website.<\/li>\n<li>Copy JavaScript code from an external resource.<\/li>\n<li>Return to the Swapzone tab, type javascript: into the address bar, paste the copied code and press Enter.<\/li>\n<\/ol>\n<p>This method uses the browser\u2019s javascript: URI scheme to execute code in the context of the open site. Analysis showed the initial script loads a second, heavily obfuscated payload. It injects itself into the Swapzone page, replacing legitimate Next.js scripts responsible for processing transactions:<\/p>\n<ul class=\"wp-block-list\">\n<li>address substitution. The malicious script contains a list of the attackers\u2019 bitcoin addresses. It inserts one of them instead of the legitimate deposit address generated by the exchange;<\/li>\n<li>visual deception. The code changes the displayed exchange rates and payout amounts on screen, creating the impression that the \u201carbitrage scheme\u201d is working;<\/li>\n<li>result. The victim sees the familiar interface of a legitimate service but sends money to the hacker\u2019s bitcoin wallet.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">New Android trojan disguised as IPTV apps<\/h2>\n<p>A new piece of Android malware poses as an IPTV app to steal digital identities and access victims\u2019 bank accounts, <a href=\"https:\/\/www.threatfabric.com\/blogs\/massiv-when-your-iptv-app-terminates-your-savings\">reported<\/a> ThreatFabric researchers.<\/p>\n<p>The Massiv virus uses screen overlays and keylogging to collect sensitive data. It can also establish full remote control of an infected device.<\/p>\n<p>During the campaign, Massiv targeted a Portuguese government app tied to Chave M\u00f3vel Digital, the national digital authentication and signature system. Data held in these services can be used to bypass KYC checks, access bank accounts and other public and private online services.<\/p>\n<p>ThreatFabric says there have been cases of bank accounts and services being opened in a victim\u2019s name without their knowledge.<\/p>\n<p>Massiv gives operators two modes of remote control:<\/p>\n<ul class=\"wp-block-list\">\n<li>screen streaming \u2014 uses the Android MediaProjection <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> to broadcast the screen in real time;<\/li>\n<li>UI-tree mode \u2014 extraction of structured data via the Accessibility Service.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"546\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-62fec3984e5092cb-6824502487843520-1024x546.png\" alt=\"image\" class=\"wp-image-275515\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-62fec3984e5092cb-6824502487843520-1024x546.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-62fec3984e5092cb-6824502487843520-300x160.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-62fec3984e5092cb-6824502487843520-768x410.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-62fec3984e5092cb-6824502487843520.png 1434w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: ThreatFabric.<\/figcaption><\/figure>\n<p>The second mode lets attackers see text, UI element names and their coordinates. That allows them to press buttons and edit text fields on the user\u2019s behalf. More importantly, the method can bypass screenshot protections often built into banking and finance apps.<\/p>\n<p>Researchers noted a striking trend: over the past eight months the use of IPTV apps as lures for infecting Android devices has surged.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-914a8e97bb92a9b9-6824502302425253-1024x564.png\" alt=\"image\" class=\"wp-image-275514\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-914a8e97bb92a9b9-6824502302425253-1024x564.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-914a8e97bb92a9b9-6824502302425253-300x165.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-914a8e97bb92a9b9-6824502302425253-768x423.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-914a8e97bb92a9b9-6824502302425253.png 1453w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: ThreatFabric.<\/figcaption><\/figure>\n<p>Such apps often infringe copyright, so they are not available on Google Play. Users are accustomed to downloading APKs from unofficial sources and installing them manually.<\/p>\n<p>The campaign is aimed at residents of Spain, Portugal, France and Turkey.<\/p>\n<h2 class=\"wp-block-heading\">Trezor and Ledger users received phishing letters by post<\/h2>\n<p>Users of <a href=\"https:\/\/forklog.com\/en\/news\/hackers-exploit-trezor-support-form-in-phishing-attack\">Trezor<\/a> and <a href=\"https:\/\/forklog.com\/en\/news\/ledger-and-trezor-unveil-next-generation-hardware-wallets\">Ledger<\/a> have begun receiving physical letters sent by scammers purporting to be the makers of the hardware wallets.<\/p>\n<p>According to cybersecurity specialist Dmitry Smilyanets, the <a href=\"https:\/\/x.com\/ddd1ms\/status\/2022031180502380647\" title=\"\">letter<\/a> he received looked like an official notice from Trezor\u2019s security department.<\/p>\n<p>On company letterhead, the client was instructed to complete a mandatory step: scan a QR code and finish verification on a special website by a set date. Failure to do so would result in the loss of wallet functionality, the letter warned.<\/p>\n<p>In comments under the post, other earlier phishing cases allegedly from Ledger representatives also <a href=\"https:\/\/x.com\/0x001408\/status\/2022110402285645873\">surfaced<\/a>. Both letters created urgency, pushing victims to act immediately.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">at least they could have worked on a better phishing page \ud83d\ude2d\ud83d\ude2d<\/p>\n<p>even plaintext seed words sent to telegram api\u2026<\/p>\n<p>trezor.authentication-check[.]io\/black\/ <a href=\"https:\/\/t.co\/fa85203awR\">pic.twitter.com\/fa85203awR<\/a><\/p>\n<p>\u2014 Who said what? (@g0njxa) <a href=\"https:\/\/twitter.com\/g0njxa\/status\/2022042464601973010?ref_src=twsrc%5Etfw\">February 12, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The QR codes in the letters led to malicious sites mimicking the official setup pages for Trezor and Ledger. At the final step, users were forced to enter their seed phrase to \u201cconfirm ownership of the device\u201d.<\/p>\n<h2 class=\"wp-block-heading\">Researcher accuses big firms of tracking Chrome users via extensions<\/h2>\n<p>A researcher going by Q Continuum <a href=\"https:\/\/github.com\/qcontinuum1\/spying-extensions\">found<\/a> 287 Chrome extensions that transmit all browsing-history data to third-party companies. Their combined installs exceed 37.4 million.<\/p>\n<p>Using an automated testing system, the specialist checked 32,000 plugins from the Chrome Web Store and identified more than 30 companies collecting data.<\/p>\n<p>The analyst argues that extensions offering handy tools are unjustifiably requesting access to browser history. Some additionally encrypt the data, hindering detection.<\/p>\n<p>According to the researcher, some of the data collection is formally spelled out in privacy policies. Not all users, however, pay due attention to them.<\/p>\n<p>The researcher called out Similarweb, Semrush, Alibaba Group, ByteDance and Big Star Labs, an entity affiliated with Similarweb.<\/p>\n<p>Under suspicion are the Stylish theme customiser and ad blockers (Stands AdBlocker and Poper Blocker, CrxMouse), as well as Similarweb\u2019s own extension (SimilarWeb: Website Traffic &#038; SEO Checker).<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"156\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843-1024x156.png\" alt=\"image\" class=\"wp-image-275513\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843-1024x156.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843-300x46.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843-768x117.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843-1536x234.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-14c0998b9f94154f-6824501136729843.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Q Continuum\u2019s GitHub.<\/figcaption><\/figure>\n<p>Roughly 20 million of the 37.4 million installs could not be tied to specific data recipients.<\/p>\n<p>Similarweb\u2019s privacy policy documents its data collection. The company says it anonymises information on the client side, though it also notes that \u201csome of this data may include personal and confidential information depending on search queries and viewed content\u201d.<\/p>\n<h2 class=\"wp-block-heading\">Data of customers of a popular adult-toy maker leaked<\/h2>\n<p>Japanese company Tenga sent customers notices of a data-security incident, <a href=\"https:\/\/techcrunch.com\/2026\/02\/19\/sex-toys-maker-tenga-says-hacker-stole-customer-information\/\">reports<\/a> TechCrunch.<\/p>\n<p>According to the notice, \u201can unauthorised party accessed the professional email account of one of our employees\u201d, giving the hacker access to the inbox. This potentially allowed them to view and steal customer names, email addresses and message histories that \u201cmight have included order details or support enquiries\u201d.<\/p>\n<p>The hacker also sent spam to the contact list of the compromised employee, including company clients.<\/p>\n<p>After publication, a Tenga representative told TechCrunch that a technical examination indicated the leak affected \u201capproximately 600 individuals\u201d in the United States.<\/p>\n<p>Tenga is a global supplier of adult goods. Given the nature of the products, order and support details are likely to contain personal information many customers prefer not to disclose.<\/p>\n<p>The company has taken several protective measures:<\/p>\n<ul class=\"wp-block-list\">\n<li>resetting credentials for the compromised employee;<\/li>\n<li>rolling out multi-factor authentication across all systems \u2014 a basic security feature that prevents account access even with a stolen password.<\/li>\n<\/ul>\n<p>The representative declined to say whether two-factor authentication was enabled on the email account before the breach.<\/p>\n<h2 class=\"wp-block-heading\">In Africa, 651 suspects arrested in cybercrime operation<\/h2>\n<p>Law enforcement in African countries arrested 651 suspects and seized more than $4.3 million in a joint operation against investment fraud, <a href=\"https:\/\/www.interpol.int\/News-and-Events\/News\/2026\/Major-operation-in-Africa-targeting-online-scams-nets-651-arrests-recovers-USD-4.3-million\">Interpol<\/a> reports.<\/p>\n<p>Red Card 2.0 targeted cybercriminal groups linked to financial losses exceeding $45 million. Authorities in 16 countries seized 2,341 devices and blocked 1,442 malicious websites, domains and servers.<\/p>\n<p>Key results by country:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Nigeria<\/strong>. Police dismantled an investment-fraud network that recruited young people to conduct phishing attacks, steal identities and run fake investment schemes. More than 1,000 fraudulent social-media accounts were removed. Six gang members who used stolen employee credentials to breach a major telecom provider were also arrested;<\/li>\n<li><strong>Kenya<\/strong>. Twenty-seven suspects were detained during probes into groups that lured victims into bogus investment projects via social networks and messengers;<\/li>\n<li><strong>C\u00f4te d\u2019Ivoire<\/strong>. Fifty-eight people were arrested as part of a crackdown on microloan apps that used hidden fees and illegal debt-collection methods.<\/li>\n<\/ul>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>OpenAI <a href=\"https:\/\/forklog.com\/en\/news\/openai-unveils-benchmark-for-ai-agents-ability-to-hack-smart-contracts\">released<\/a> a benchmark to assess AI agents\u2019 ability to hack smart contracts.<\/li>\n<li>Vibe coding via Claude Opus <a href=\"https:\/\/forklog.com\/en\/news\/vibe-coding-via-claude-opus-leads-to-moonwell-defi-project-breach\">led<\/a> to the hack of the Moonwell DeFi project.<\/li>\n<li>Figure <a href=\"https:\/\/forklog.com\/en\/news\/figure-admits-to-customer-data-breach\">acknowledged<\/a> a leak of customers\u2019 personal data.<\/li>\n<li>From a cold wallet held by South Korea\u2019s police, 22 BTC <a href=\"https:\/\/forklog.com\/en\/news\/22-btc-vanish-from-south-korean-police-cold-wallet\">went missing<\/a>.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>In his novel \u201cBlindsight\u201d, Canadian biologist and writer Peter Watts proposed a radical hypothesis: intelligence can function effectively without consciousness. Nearly 20 years on, the thesis neatly describes generative AI.<\/p>\n<p>In a new piece, ForkLog examines the mistakes we make when anthropomorphising algorithms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A roundup of the week\u2019s key cybersecurity developments.<\/p>\n","protected":false},"author":1,"featured_media":94521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Crypto scams, Android malware, Chrome tracking and a sex-toy maker\u2019s data leak.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-94520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"208","promo_type":"1","layout_type":"1","short_excerpt":"Crypto scams, Android malware, Chrome tracking and a sex-toy maker\u2019s data leak.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=94520"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94520\/revisions"}],"predecessor-version":[{"id":94522,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94520\/revisions\/94522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/94521"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=94520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=94520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=94520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}