Clone Website Used For Hacking Into Computers For Stealing Cryptocurrencies
There was a significant delay in the ransomware attack throughout last year. But as per the research by Fumiko and Tweeter user, there has been an abrupt rise in 2019. The investigators have found a website through which the bad practitioners spreads cryptocurrency malware. The report was published on 5th June by a leading website.
The viruses are transmitted through a website that takes the disguise of CryptoHoppers the website is mainly used for creating tools that can be used for cryptocurrency trading. In short, the hackers have created a clone of CryptoHopper. Once the website is visited, the Setup.exe file gets downloaded to innocent users’ computer, and ultimately it gets infected.
The setup file installs two Trojan viruses that are used for hijacking the clipboard and mining. Both the viruses collect all the information and deploy them every moment. The aforementioned viruses steal all the browsing information, including payment history.
The stolen information is compiled and sent to the remote computer. The hijackers try to substitute their address on the clipboard of the victim. Whenever the victim attempts to do cryptocurrency transaction, it gets redirected to hijacker’s address.
The hijackers have address substitutions for almost all types of cryptocurrencies. Through this substitution address, one wallet has got 33 BTC.
It seems cyber-attack will never stop, and it will remain as long as it proves to be a beneficial business for the attackers. The user has to be more careful while visiting any suspicious site. They should make it tougher for the attacker to get ahead. If the attack happens, the recovery plan should also be kept ready so that one does not have to pay a ransom.
Backup should be taken regularly for the critical files and should be tested and should be stored securely.
To safeguard from web-based outbreaks, web filtering should be allowed; this prevents a user from going to a mischievous website and copying executable files.
Technical controls are important, but the end line of protection comes from an awareness of the end user. That only comes from training and teaching the user about the potential threats. With this layered Défense, it can make it, difficult to succeed in cyber-attacks.