{"id":95685,"date":"2026-03-28T07:00:00","date_gmt":"2026-03-28T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=95685"},"modified":"2026-03-28T08:56:27","modified_gmt":"2026-03-28T05:56:27","slug":"india-arrests-trafficker-solana-used-as-a-dead-drop-and-other-cybersecurity-developments","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/india-arrests-trafficker-solana-used-as-a-dead-drop-and-other-cybersecurity-developments\/","title":{"rendered":"India arrests trafficker, Solana used as a dead drop, and other cybersecurity developments"},"content":{"rendered":"<p>We have gathered the week&#8217;s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Over 700 browser-based crypto wallets were targeted by an info-stealer.<\/li>\n<li>The UK imposed sanctions on Xinbi and scam compounds in Southeast Asia.<\/li>\n<li>Malware used Solana to steal crypto data and conduct phishing.<\/li>\n<li>A cyberattack on an ignition interlock maker limited access to vehicles.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Over 700 browser-based crypto wallets targeted by an info-stealer<\/h2>\n<p>The new Torg Grabber info-stealer targets sensitive data across 850 browser extensions, including crypto wallets, password managers, note-taking apps and two-factor authentication tools, <a href=\"https:\/\/www.gendigital.com\/blog\/insights\/research\/torg-grabber-credential-stealer-analysis\">report<\/a> cybersecurity researchers at Gen Digital.<\/p>\n<p>Initial access is achieved via the ClickFix technique: attackers hijack the clipboard and trick users into executing a malicious PowerShell command.<\/p>\n<p>The list of targeted extensions includes 728 crypto wallets such as <a href=\"https:\/\/forklog.com\/en\/news\/what-is-metamask\">MetaMask<\/a>, Phantom and Trust Wallet.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-137510bc6262bae9-233234288849386.webp\" alt=\"image\" class=\"wp-image-277575\"\/><figcaption class=\"wp-element-caption\">Source: Gen Digital.<\/figcaption><\/figure>\n<p>Torg Grabber also harvests data from Discord, Telegram, Steam, VPN tools, email services and desktop versions of crypto apps.<\/p>\n<p>Beyond these features, the malware can:<\/p>\n<ul class=\"wp-block-list\">\n<li>create a device fingerprint;<\/li>\n<li>enumerate installed software (including 24 antivirus tools);<\/li>\n<li>capture desktop screenshots;<\/li>\n<li>steal files from the Desktop and Documents folders;<\/li>\n<li>execute arbitrary code on the infected device.<\/li>\n<\/ul>\n<p>Since late 2025, scammers have used a more resilient HTTPS connection via Cloudflare\u2019s infrastructure. They also taught the stealer to bypass cookie protections in Chrome, Brave, Edge, Vivaldi and Opera.<\/p>\n<p>According to researchers, 334 samples were compiled between December 2025 and February 2026, with new command-and-control servers registered weekly.<\/p>\n<h2 class=\"wp-block-heading\">UK sanctions Xinbi and scam compounds in Southeast Asia<\/h2>\n<p>On 26 March, the UK government <a href=\"https:\/\/www.gov.uk\/government\/news\/uk-crackdown-on-vile-scam-centres-steps-up-with-sanctions-on-illicit-crypto-network\">imposed<\/a> sanctions on the crypto marketplace Xinbi and individuals linked to <a href=\"https:\/\/forklog.com\/en\/news\/southeast-asian-scam-camps-chinas-cyber-espionage-at-scale-and-other-cybersecurity-news\">scam compounds<\/a> in Southeast Asia.<\/p>\n<p>Officials said the platform facilitates the sale of stolen personal data and provides tools to find victims, including satellite internet equipment. The measures restrict the network\u2019s access to financial channels.<\/p>\n<p>The sanctions also hit Legend Innovation, operator of #8Park \u2014 a large scam compound in Cambodia. Preliminary estimates suggest up to 20,000 forced labourers are held there. The firm\u2019s director, Eang Soklim, and individuals tied to the Prince Group financial network were designated.<\/p>\n<p>According to <a href=\"https:\/\/www.chainalysis.com\/blog\/xinbi-designation-chinese-language-crypto-scam-infrastructure\/\">Chainalysis<\/a>, more than $19.9bn in transactions flowed through Xinbi between 2021 and 2025.<\/p>\n<p>In India, law enforcement <a href=\"https:\/\/x.com\/CBIHeadquarters\/status\/2037176398893518914\">arrested<\/a> Sunil Nellatt Ramakrishnan, also known as Krish, on suspicion of trafficking people to fraudulent crypto centres in Myanmar.<\/p>\n<p>Authorities say he was a key player in transporting victims from Delhi to Bangkok under the pretext of legal employment in Thailand. People were forcibly moved to the Myawaddy area, including the KK Park complex.<\/p>\n<p>Searches at the suspect\u2019s residence linked him to human-trafficking operations in Cambodia.<\/p>\n<h2 class=\"wp-block-heading\">Malware used Solana to steal crypto data and phish<\/h2>\n<p>Cybersecurity firm Aikido <a href=\"https:\/\/www.aikido.dev\/blog\/glassworm-chrome-extension-rat\">observed<\/a> a new phase of the GlassWorm campaign. Hackers distribute phishing code bundles that steal developer data and install a remote access trojan.<\/p>\n<p>GlassWorm gains access via malicious packages published to developer repositories including npm, PyPI, GitHub and the Open VSX marketplace.<\/p>\n<p>Its operators also compromise maintainers\u2019 accounts on popular projects to push poisoned updates.<\/p>\n<p>Rather than hard-coding the command server address (where it is easy to find and block), the hackers used a \u201cdead drop\u201d method and hid it on the <a href=\"https:\/\/forklog.com\/en\/news\/what-is-solana-sol\">Solana<\/a> blockchain.<\/p>\n<p>The loader connects to the network and checks preselected crypto wallets, looking for transactions with a memo field. Once found, it extracts the obfuscated link, decrypts it and connects to the remote server. The malware does not infect systems with a Russian locale.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"356\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-fc050f48ce017e03-233234388667742-1024x356.png\" alt=\"image\" class=\"wp-image-277576\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-fc050f48ce017e03-233234388667742-1024x356.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-fc050f48ce017e03-233234388667742-300x104.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-fc050f48ce017e03-233234388667742-768x267.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-fc050f48ce017e03-233234388667742.png 1044w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Decoding the Solana memo field into the hackers\u2019 remote server link. Source: Aikido.<\/figcaption><\/figure>\n<p>The second stage of the attack includes:<\/p>\n<ul class=\"wp-block-list\">\n<li>theft and collection of data, exfiltration of crypto wallets and system profiling;<\/li>\n<li>exfiltration. Collected data is compressed into a ZIP archive and sent to an external server;<\/li>\n<li>follow-on downloads. After exfiltration, the chain pulls two more components.<\/li>\n<\/ul>\n<p>The first is a component for detecting USB devices. When a user connects <a href=\"https:\/\/forklog.com\/en\/news\/cold-wallets-dividing-access-below-zero\">a hardware wallet<\/a>, a phishing window appears:<\/p>\n<ul class=\"wp-block-list\">\n<li>for Ledger \u2014 a fake configuration error with 24 fields for entering the recovery phrase;<\/li>\n<li>for Trezor \u2014 a \u201cfirmware verification failure\u201d message and forced emergency reboot with similar input fields.<\/li>\n<\/ul>\n<p>The second component is a JavaScript RAT. Its download address is extracted from a Google Calendar event description (another \u201cdead drop\u201d method).<\/p>\n<p>Its tasks include launching a covert remote desktop module, stealing browser data and executing arbitrary JavaScript.<\/p>\n<p>In addition, the trojan forcibly installs the Google Docs Offline extension. It collects a tree of active tabs, up to 5,000 history entries, screenshots and clipboard contents. The extension also monitors crypto exchanges such as <a href=\"https:\/\/forklog.com\/en\/news\/life-after-bybit\">Bybit<\/a>, tracking authorisation tokens and device IDs.<\/p>\n<h2 class=\"wp-block-heading\">Cyberattack on an ignition interlock maker limited access to vehicles<\/h2>\n<p>Hackers attacked Intoxalock, a US supplier of vehicle ignition interlock systems. Disrupted devices left some owners unable to start their cars, the outlet \u201c<a href=\"https:\/\/xakep.ru\/2026\/03\/25\/intoxalock-attack\/\">\u0425\u0430\u043a\u0435\u0440<\/a>\u201d reported.<\/p>\n<p>Intoxalock makes devices that offenders convicted of drink-driving are required to install. To start the engine, a driver must blow into a tube to verify that blood alcohol content is below the legal limit; otherwise the car will not start. In some states the system also records GPS coordinates and routinely photographs the person at the wheel.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-0a09e9a975e459a9-233234649912063.webp\" alt=\"image\" class=\"wp-image-277577\"\/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/www.intoxalock.com\/ignition-interlock-cost\">Intoxalock<\/a>.<\/figcaption><\/figure>\n<p>According to media reports, the device must be calibrated roughly once a month. Owing to the cyberattack, calibration proved impossible and drivers whose checks had expired were locked out. In Connecticut alone, the issue <a href=\"https:\/\/www.msn.com\/en-us\/news\/us\/ct-drivers-caught-up-in-cyberattack-on-breathalyzer-company\/ar-AA1ZdNAM\">affected<\/a> 7\u201310% of users.<\/p>\n<p>The company <a href=\"https:\/\/learn.intoxalock.com\/status\">extended<\/a> service-centre authorisations by 10 days, though the grace period did not apply to all device versions or all states.<\/p>\n<p>The system was restored on 22 March. Intoxalock\u2019s management pledged to reimburse users\u2019 expenses, including vehicle towing.<\/p>\n<h2 class=\"wp-block-heading\">Researcher found a trojan in the LiteLLM AI app<\/h2>\n<p>Malware for stealing credentials was discovered in the popular LiteLLM AI application, <a href=\"https:\/\/futuresearch.ai\/blog\/no-prompt-injection-required\/\">reported<\/a> Callum McMahon of FutureSearch.<\/p>\n<p>LiteLLM lets developers connect to hundreds of different neural networks and manage subscription payments. The project has over 40,000 GitHub stars, thousands of forks, and daily downloads <a href=\"https:\/\/snyk.io\/articles\/poisoned-security-scanner-backdooring-litellm\/\">reach<\/a> 3.4 million.<\/p>\n<p>According to McMahon, the virus entered via a third-party software package on which LiteLLM depends. He suspected an infection when his computer suddenly shut down right after installing the software. A bug in the malware itself caused the crash, revealing the presence of the hacker\u2019s code.<\/p>\n<p>McMahon and noted developer Andrej Karpathy <a href=\"https:\/\/x.com\/karpathy\/status\/2036487306585268612\">reached<\/a> a shared conclusion: the virus was created through \u201cvibe coding\u201d without careful review.<\/p>\n<p>How the malware worked:<\/p>\n<ul class=\"wp-block-list\">\n<li>stole any credentials it could find;<\/li>\n<li>used them to access other accounts and packages to harvest yet more passwords;<\/li>\n<li>propagated along the chain, compromising additional systems.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/techcrunch.com\/2026\/03\/26\/delve-did-the-security-compliance-on-litellm-an-ai-project-hit-by-malware\/\">TechCrunch<\/a> noted that LiteLLM\u2019s website displays badges for major security certifications SOC 2 and ISO 27001, issued after an audit by Delve. The firm bills itself as an AI-based service that automates cybersecurity compliance.<\/p>\n<p>According to media reports, Delve had previously been accused of generating fake report data, using questionable auditors and misleading clients about their security posture.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Oh damn, I thought this WAS a joke<\/p>\n<p>\u2026 but no, LiteLLM *really* was &#8220;Secured by Delve&#8221; (the company that rubber stamped all of these audits, and seems to have been on the edge of fraudlent auditing, but useless for sure)<\/p>\n<p>And so unspririsingly LiteLLM was compromised, badly <a href=\"https:\/\/t.co\/P7FZrsagAb\">https:\/\/t.co\/P7FZrsagAb<\/a><\/p>\n<p>\u2014 Gergely Orosz (@GergelyOrosz) <a href=\"https:\/\/twitter.com\/GergelyOrosz\/status\/2036509357794378156?ref_src=twsrc%5Etfw\">March 24, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>LiteLLM\u2019s developers mitigated the threat within hours of the tainted release appearing. The company has begun an investigation with Mandiant.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Fenbushi Capital\u2019s co-founder <a href=\"https:\/\/forklog.com\/en\/news\/fenbushi-capital-co-founder-offers-reward-for-return-of-stolen-42-million\">offered<\/a> a bounty for the return of the stolen $42 million.<\/li>\n<li>ZachXBT <a href=\"https:\/\/forklog.com\/en\/news\/zachxbt-accuses-circle-of-wrongfully-freezing-16-wallets\">accused<\/a> Circle of mistakenly freezing 16 wallets.<\/li>\n<li>Irish authorities <a href=\"https:\/\/forklog.com\/en\/news\/irish-authorities-secure-access-to-e30-million-in-bitcoin\">gained<\/a> access to \u20ac30 million in bitcoin.<\/li>\n<li>A hack of Resolv <a href=\"https:\/\/forklog.com\/en\/news\/hacker-attack-on-resolv-crashes-usr-stablecoin\">crashed<\/a> the USR stablecoin.<\/li>\n<li>Google <a href=\"https:\/\/forklog.com\/en\/news\/google-uncovers-darksword-exploit-chain-targeting-iphones\">identified<\/a> a DarkSword exploit chain for hacking iPhones.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>In a new ForkLog feature, we explain how Russia\u2019s authorities plan to monitor every crypto transaction inside the country and why bitcoin wallet keys may have to be shared with a digital depository.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have gathered the week&#8217;s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":95686,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"The week's key cybersecurity stories: wallets targeted, Solana dead drop, UK sanctions, and more.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-95685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"77","promo_type":"1","layout_type":"1","short_excerpt":"The week's key cybersecurity stories: wallets targeted, Solana dead drop, UK sanctions, and more.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=95685"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95685\/revisions"}],"predecessor-version":[{"id":95687,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/95685\/revisions\/95687"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/95686"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=95685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=95685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=95685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}