Coming as the latest development in the cryptocurrency sphere, a cybersecurity company divulged on Thursday, a new malware that embezzles information about cryptocurrency and digital asset wallets. The development is reported in a blog post by Zscaler and the malware is named as InnfiRAT.
As explained by KoinPost earlier, users store their BTC, ETH, LTC, XLM, BCH, and other virtual assets in cryptocurrency wallets. Notably, some among these crypto wallets are hot wallets. Hot wallet means a wallet which is connected to the internet. On the other hand, cold crypto wallets can only be accessed locally. Notably, a lot of people don’t bother to store their digital asset wallets on non-connected drives because it’s not suitable. It can also be dangerous if the user forgets his password.
Cryptocurrency Wallet Malware InnfiRAT and Zscaler Report
Regarding the purpose of InnfiRAT, Zscaler mentioned that similar to every other malware, InnfiRAT is designed to way in and embezzle personal information on a user’s computer. The blog added that among other things, InnfiRAT is written to look for cryptocurrency and digital asset wallet information. For instance, these assets include Bitcoin and Litecoin. Apart from that, the malware also captures browser cookies to whip stored passwords and respective usernames, along with session data. Additionally, the malware has ScreenShot functionality to capture information from open windows. For instance, the malware takes a screenshot, if the affected user is reading an email. Apart from that, it also checks for other applications running on the system. These applications even include an active antivirus program, as per the blog post.
Hacking is a common occurrence in the crypto ecosystem. Recently, KoinPost reported about various crypto hacking incidents around the world. The major ones reported by KoinPost are Crypto exchange hacked by Lazarus hacking group, Metamask hacked, and Cryptopia hacked.
It is to be noted that robbing of digital currency wallets is not the only purpose of the aforementioned malware. What’s more, Zscaler mentioned that malware like this could also be used to carry out any number of tasks. This includes logging keystrokes, accessing confidential information, formatting drives, and even activating the system’s webcam, etc.
What do you think about the increasing number of viruses and Trojans being developed in the crypto ecosystem and their effect on users?