A new wave of sophisticated crypto-stealing malware is spreading across the internet as scammers create fake AI, gaming, and Web3 startups to lure victims into downloading malicious software. Cybersecurity firm Darktrace has raised the alarm, detailing how these campaigns operate through elaborate social engineering tactics that exploit trust in digital startups. Attackers are setting up fake companies with convincing websites, social media profiles, GitHub repositories, white papers, and even fake team pages on platforms like Notion. Many of the sites also appear to be linked to verified or compromised X (formerly Twitter) accounts to appear more legitimate. The fake accounts often post software updates, blog content, and product announcements to maintain the illusion of authenticity. “Threat actors are going to great lengths to make these fake startups look real,” the firm stated, adding that the scam has already impacted users globally. Victims are often contacted directly on platforms like X, Telegram, or Discord, with the impersonators presenting themselves as employees of the fake firms, offering cryptocurrency in exchange for testing their software. Users are then given a registration code and directed to download malware-infected applications from professional-looking websites. Source: Darktrace Darktrace Warns of Advanced Malware Campaign Targeting Crypto Users One of the identified schemes involved a fake blockchain game called “Eternal Decay,” which used altered images to claim conference participation and listed fake investors. Gameplay images were also lifted from another game called “Zombie Within.” Other noted fake startups include names like Pollens AI, Swox, and Buzzu, with nearly identical branding and codebases. MY WALLET GOT DRAINED LAST NIGHT 💔 This is not a stunt or a click bait but legit, I got scammed yesterday of 0.4Sol (130,000naira) and here is how it happened. It cost me 0.4 sol in loss to learn this and I don’t want anyone to fall victim to this so please repost for more… pic.twitter.com/x5h7yGjlan — Prymex.eth (@EmekaOghali) May 30, 2025 According to Darktrace, the malware, targeting both Windows and macOS users, is capable of stealing crypto wallet credentials and personal information, using tools like the Realst and Atomic Stealer malware families. Darktrace technical analysis shows that on Windows, the attackers use Electron-based apps to perform system profiling, download malicious files, and execute them quietly. Source: Darktrace On macOS, a disguised DMG file installs the Atomic Stealer , which collects browser data, wallet credentials, and other sensitive files before sending them to attacker-controlled servers. Source: Darktrace Darktrace noted that the malware includes advanced evasion techniques, such as stolen software signing certificates, obfuscation, and persistent background execution to avoid detection. “This is one of the more elaborate and persistent social engineering campaigns we’ve seen targeting the crypto space,” said a Darktrace researcher familiar with the investigation. “They’re building out fake companies with all the digital trimmings — even fake merchandise stores and doctored company registrations — just to get users to download malware,” they added. Notably, Darktrace believes the tactics resemble those previously linked to a malware group known as “CrazyEvil,” identified by Recorded Future earlier this year. That group was known for targeting crypto users and developers through fake projects and social engineering techniques. While it’s unclear whether CrazyEvil is directly responsible for this campaign, the tactics appear consistent. Darktrace warned that the threat actors are using newer variants of malware and more elaborate deception methods to lure victims. Malware Campaigns and Credential Breaches Fuel 2025 Crypto Crime Surge The rise in crypto-targeted scams hasn’t slowed down, and now, a wave of highly coordinated malware and credential breaches is pushing 2025 toward record-breaking crypto losses. According to Kaspersky’s Financial Cyberthreats report , crypto phishing detections have surged 83.4% year-over-year, while mobile banking Trojan attacks have increased 3.6x. In contrast, traditional banking malware has declined, indicating a shift in attacker priorities from fiat systems to crypto wallets. One of the most alarming developments is “SparkKitty,” a sophisticated mobile malware strain active since February 2024. Notably, the tool, which was disguised as TikTok mods or crypto apps, has infiltrated Google Play and the App Store, bypassing security checks to steal seed phrases stored in user photo galleries . 🕸️ @kaspersky discovers SparkKitty malware stealing crypto seed phrase screenshots from iOS and Android using OCR technology after successfully infiltrating official app stores. #Malware #Crypto https://t.co/2oMOhyN1g3 — Cryptonews.com (@cryptonews) June 24, 2025 SparkKitty, an evolution of the earlier SparkCat campaign, uses OCR technology to scan screenshots of wallet credentials from infected devices. Meanwhile, in May, cybersecurity analysts traced malware back to Procolored , a Chinese printer manufacturer. The printer’s official drivers carried a crypto-stealing remote access trojan, replacing copied wallet addresses with those of attackers. ‼️ ALERT: Chinese printer firm Procolored shipped malware in official drivers. Over 9.3 BTC stolen. Company blames USB error. #CyberSecurity #Bitcoin #Procolored https://t.co/Wb9q7DXL4X — Cryptonews.com (@cryptonews) May 19, 2025 The scheme went undetected for six months, resulting in the theft of 9.3 BTC, worth nearly $1 million. Adding to the threat, a massive data breach uncovered by Cybernews revealed over 16 billion login credentials , many collected via infostealer malware. The breach included sensitive access data from platforms like Telegram, GitHub, and Apple, escalating risks for crypto users managing assets online. Combined with CertiK’s estimate of $2.2 billion lost to crypto attacks in H1 2025 , these incidents indicate the growing sophistication of cybercrime targeting digital assets.A new wave of sophisticated crypto-stealing malware is spreading across the internet as scammers create fake AI, gaming, and Web3 startups to lure victims into downloading malicious software. Cybersecurity firm Darktrace has raised the alarm, detailing how these campaigns operate through elaborate social engineering tactics that exploit trust in digital startups. Attackers are setting up fake companies with convincing websites, social media profiles, GitHub repositories, white papers, and even fake team pages on platforms like Notion. Many of the sites also appear to be linked to verified or compromised X (formerly Twitter) accounts to appear more legitimate. The fake accounts often post software updates, blog content, and product announcements to maintain the illusion of authenticity. “Threat actors are going to great lengths to make these fake startups look real,” the firm stated, adding that the scam has already impacted users globally. Victims are often contacted directly on platforms like X, Telegram, or Discord, with the impersonators presenting themselves as employees of the fake firms, offering cryptocurrency in exchange for testing their software. Users are then given a registration code and directed to download malware-infected applications from professional-looking websites. Source: Darktrace Darktrace Warns of Advanced Malware Campaign Targeting Crypto Users One of the identified schemes involved a fake blockchain game called “Eternal Decay,” which used altered images to claim conference participation and listed fake investors. Gameplay images were also lifted from another game called “Zombie Within.” Other noted fake startups include names like Pollens AI, Swox, and Buzzu, with nearly identical branding and codebases. MY WALLET GOT DRAINED LAST NIGHT 💔 This is not a stunt or a click bait but legit, I got scammed yesterday of 0.4Sol (130,000naira) and here is how it happened. It cost me 0.4 sol in loss to learn this and I don’t want anyone to fall victim to this so please repost for more… pic.twitter.com/x5h7yGjlan — Prymex.eth (@EmekaOghali) May 30, 2025 According to Darktrace, the malware, targeting both Windows and macOS users, is capable of stealing crypto wallet credentials and personal information, using tools like the Realst and Atomic Stealer malware families. Darktrace technical analysis shows that on Windows, the attackers use Electron-based apps to perform system profiling, download malicious files, and execute them quietly. Source: Darktrace On macOS, a disguised DMG file installs the Atomic Stealer , which collects browser data, wallet credentials, and other sensitive files before sending them to attacker-controlled servers. Source: Darktrace Darktrace noted that the malware includes advanced evasion techniques, such as stolen software signing certificates, obfuscation, and persistent background execution to avoid detection. “This is one of the more elaborate and persistent social engineering campaigns we’ve seen targeting the crypto space,” said a Darktrace researcher familiar with the investigation. “They’re building out fake companies with all the digital trimmings — even fake merchandise stores and doctored company registrations — just to get users to download malware,” they added. Notably, Darktrace believes the tactics resemble those previously linked to a malware group known as “CrazyEvil,” identified by Recorded Future earlier this year. That group was known for targeting crypto users and developers through fake projects and social engineering techniques. While it’s unclear whether CrazyEvil is directly responsible for this campaign, the tactics appear consistent. Darktrace warned that the threat actors are using newer variants of malware and more elaborate deception methods to lure victims. Malware Campaigns and Credential Breaches Fuel 2025 Crypto Crime Surge The rise in crypto-targeted scams hasn’t slowed down, and now, a wave of highly coordinated malware and credential breaches is pushing 2025 toward record-breaking crypto losses. According to Kaspersky’s Financial Cyberthreats report , crypto phishing detections have surged 83.4% year-over-year, while mobile banking Trojan attacks have increased 3.6x. In contrast, traditional banking malware has declined, indicating a shift in attacker priorities from fiat systems to crypto wallets. One of the most alarming developments is “SparkKitty,” a sophisticated mobile malware strain active since February 2024. Notably, the tool, which was disguised as TikTok mods or crypto apps, has infiltrated Google Play and the App Store, bypassing security checks to steal seed phrases stored in user photo galleries . 🕸️ @kaspersky discovers SparkKitty malware stealing crypto seed phrase screenshots from iOS and Android using OCR technology after successfully infiltrating official app stores. #Malware #Crypto https://t.co/2oMOhyN1g3 — Cryptonews.com (@cryptonews) June 24, 2025 SparkKitty, an evolution of the earlier SparkCat campaign, uses OCR technology to scan screenshots of wallet credentials from infected devices. Meanwhile, in May, cybersecurity analysts traced malware back to Procolored , a Chinese printer manufacturer. The printer’s official drivers carried a crypto-stealing remote access trojan, replacing copied wallet addresses with those of attackers. ‼️ ALERT: Chinese printer firm Procolored shipped malware in official drivers. Over 9.3 BTC stolen. Company blames USB error. #CyberSecurity #Bitcoin #Procolored https://t.co/Wb9q7DXL4X — Cryptonews.com (@cryptonews) May 19, 2025 The scheme went undetected for six months, resulting in the theft of 9.3 BTC, worth nearly $1 million. Adding to the threat, a massive data breach uncovered by Cybernews revealed over 16 billion login credentials , many collected via infostealer malware. The breach included sensitive access data from platforms like Telegram, GitHub, and Apple, escalating risks for crypto users managing assets online. Combined with CertiK’s estimate of $2.2 billion lost to crypto attacks in H1 2025 , these incidents indicate the growing sophistication of cybercrime targeting digital assets.

Crypto-Stealing Malware Surges as Scammers Impersonate AI, Web3 Startups — Here’s the Catch

A new wave of sophisticated crypto-stealing malware is spreading across the internet as scammers create fake AI, gaming, and Web3 startups to lure victims into downloading malicious software.

Cybersecurity firm Darktrace has raised the alarm, detailing how these campaigns operate through elaborate social engineering tactics that exploit trust in digital startups.

Attackers are setting up fake companies with convincing websites, social media profiles, GitHub repositories, white papers, and even fake team pages on platforms like Notion.

Many of the sites also appear to be linked to verified or compromised X (formerly Twitter) accounts to appear more legitimate. The fake accounts often post software updates, blog content, and product announcements to maintain the illusion of authenticity.

“Threat actors are going to great lengths to make these fake startups look real,” the firm stated, adding that the scam has already impacted users globally.

Victims are often contacted directly on platforms like X, Telegram, or Discord, with the impersonators presenting themselves as employees of the fake firms, offering cryptocurrency in exchange for testing their software.

Users are then given a registration code and directed to download malware-infected applications from professional-looking websites.

Example of threat actor messaging a victim on X with a registration code.Source: Darktrace

Darktrace Warns of Advanced Malware Campaign Targeting Crypto Users

One of the identified schemes involved a fake blockchain game called “Eternal Decay,” which used altered images to claim conference participation and listed fake investors. Gameplay images were also lifted from another game called “Zombie Within.” Other noted fake startups include names like Pollens AI, Swox, and Buzzu, with nearly identical branding and codebases.

According to Darktrace, the malware, targeting both Windows and macOS users, is capable of stealing crypto wallet credentials and personal information, using tools like the Realst and Atomic Stealer malware families.

Darktrace technical analysis shows that on Windows, the attackers use Electron-based apps to perform system profiling, download malicious files, and execute them quietly.

Code from the Electron app showing console output of system profiling.Source: Darktrace

On macOS, a disguised DMG file installs the Atomic Stealer, which collects browser data, wallet credentials, and other sensitive files before sending them to attacker-controlled servers.

Obfuscated Bash script.Source: Darktrace

Darktrace noted that the malware includes advanced evasion techniques, such as stolen software signing certificates, obfuscation, and persistent background execution to avoid detection.

“This is one of the more elaborate and persistent social engineering campaigns we’ve seen targeting the crypto space,” said a Darktrace researcher familiar with the investigation.

“They’re building out fake companies with all the digital trimmings — even fake merchandise stores and doctored company registrations — just to get users to download malware,” they added.

Notably, Darktrace believes the tactics resemble those previously linked to a malware group known as “CrazyEvil,” identified by Recorded Future earlier this year. That group was known for targeting crypto users and developers through fake projects and social engineering techniques.

While it’s unclear whether CrazyEvil is directly responsible for this campaign, the tactics appear consistent. Darktrace warned that the threat actors are using newer variants of malware and more elaborate deception methods to lure victims.

Malware Campaigns and Credential Breaches Fuel 2025 Crypto Crime Surge

The rise in crypto-targeted scams hasn’t slowed down, and now, a wave of highly coordinated malware and credential breaches is pushing 2025 toward record-breaking crypto losses.

According to Kaspersky’s Financial Cyberthreats report, crypto phishing detections have surged 83.4% year-over-year, while mobile banking Trojan attacks have increased 3.6x.

In contrast, traditional banking malware has declined, indicating a shift in attacker priorities from fiat systems to crypto wallets.

One of the most alarming developments is “SparkKitty,” a sophisticated mobile malware strain active since February 2024.

Notably, the tool, which was disguised as TikTok mods or crypto apps, has infiltrated Google Play and the App Store, bypassing security checks to steal seed phrases stored in user photo galleries.

SparkKitty, an evolution of the earlier SparkCat campaign, uses OCR technology to scan screenshots of wallet credentials from infected devices.

Meanwhile, in May, cybersecurity analysts traced malware back to Procolored, a Chinese printer manufacturer. The printer’s official drivers carried a crypto-stealing remote access trojan, replacing copied wallet addresses with those of attackers.

The scheme went undetected for six months, resulting in the theft of 9.3 BTC, worth nearly $1 million.

Adding to the threat, a massive data breach uncovered by Cybernews revealed over 16 billion login credentials, many collected via infostealer malware.

The breach included sensitive access data from platforms like Telegram, GitHub, and Apple, escalating risks for crypto users managing assets online.

Combined with CertiK’s estimate of $2.2 billion lost to crypto attacks in H1 2025, these incidents indicate the growing sophistication of cybercrime targeting digital assets.

Piyasa Fırsatı
Threshold Logosu
Threshold Fiyatı(T)
$0.00937
$0.00937$0.00937
+4.71%
USD
Threshold (T) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Why It Could Outperform Pepe Coin And Tron With Over $7m Already Raised

Why It Could Outperform Pepe Coin And Tron With Over $7m Already Raised

The post Why It Could Outperform Pepe Coin And Tron With Over $7m Already Raised appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 20:26 While meme tokens like Pepe Coin and established networks such as Tron attract headlines, many investors are now searching for projects that combine innovation, revenue-sharing and real-world utility. BlockchainFX ($BFX), currently in presale at $0.024 ahead of an expected $0.05 launch, is quickly becoming one of the best cryptos to buy today. With $7m already secured and a unique model spanning multiple asset classes, it is positioning itself as a decentralised super app and a contender to surpass older altcoins. Early Presale Pricing Creates A Rare Entry Point BlockchainFX’s presale pricing structure has been designed to reward early participants. At $0.024, buyers secure a lower entry price than later rounds, locking in a cost basis more than 50% below the projected $0.05 launch price. As sales continue to climb beyond $7m, each new stage automatically increases the token price. This built-in mechanism creates a clear advantage for early investors and explains why the project is increasingly cited in “best presales to buy now” discussions across the crypto space. High-Yield Staking Model Shares Platform Revenue Beyond its presale appeal, BlockchainFX is creating a high-yield staking model that gives holders a direct share of platform revenue. Every time a trade occurs on its platform, 70% of trading fees flow back into the $BFX ecosystem: 50% of collected fees are automatically distributed to stakers in both BFX and USDT. 20% is allocated to daily buybacks of $BFX, adding demand and price support. Half of the bought-back tokens are permanently burned, steadily reducing supply. Rewards are based on the size of each member’s BFX holdings and capped at $25,000 USDT per day to ensure sustainability. This structure transforms token ownership from a speculative bet into an income-generating position, a rare feature among today’s altcoins. A Multi-Asset Platform…
Paylaş
BitcoinEthereumNews2025/09/18 03:35
The Contrarian Truth: Why Bitcoin and Ethereum Prices Defy Social Media Sentiment

The Contrarian Truth: Why Bitcoin and Ethereum Prices Defy Social Media Sentiment

BitcoinWorld The Contrarian Truth: Why Bitcoin and Ethereum Prices Defy Social Media Sentiment Have you ever noticed that when everyone on social media is screaming
Paylaş
bitcoinworld2025/12/20 07:45
Record instroom Bitcoin-ETF’s – richting $120.000?

Record instroom Bitcoin-ETF’s – richting $120.000?

Connect met Like-minded Crypto Enthusiasts! Connect op Discord! Check onze Discord   De markt voor Bitcoin ETF’s laat wederom een opvallende trend zien. De afgelopen week werd de grootste instroom sinds juli geregistreerd, een ontwikkeling die de aandacht van zowel institutionele als particuliere beleggers trekt. Deze instroom zorgt voor nieuwe speculatie over de vraag of Bitcoin binnenkort de grens van 120.000 dollar kan doorbreken. Laten we dit hieronder nader bekijken. Grootste instroom sinds juli Volgens recente marktgegevens wist de Amerikaanse spot Bitcoin ETF’s een instroom te krijgen ver boven de gemiddelde niveaus van de afgelopen weken. Alleen al op 16 september werd meer dan 290 miljoen dollar netto in deze fondsen gestort. Daarmee markeert dit de zevende opeenvolgende dag met positieve instroom, een duidelijk teken dat institutionele belangstelling opnieuw toeneemt. De grootste bijdrage kwam van BlackRock’s iShares Bitcoin Trust, dat meer dan 200 miljoen dollar stortte. Ook de ETF’s van Fidelity en Ark lieten grote instroom zien. Kortom, de instroom blijft positief. U.S. spot Bitcoin ETFs Ignite with a $553M daily inflow, pushing a four-day streak to $1.7B. Ether ETFs also saw a resurgence with $113M in new funds. #Bitcoin #ETF #ETHhttps://t.co/zZiNqtKSEm — Cryptonews.com (@cryptonews) September 12, 2025 Hoe instroom prijsondersteuning biedt De sterke instroom in Bitcoin ETF’s is meer dan een mijlpaal. Het laat zien hoe de vraag naar Bitcoin groeit vanuit institutionele hoek en dat deze vraag niet voor een keer is, maar structureel is. Omdat de instroom de hoeveelheid nieuw geminde Bitcoin overtreft, ontstaat er een overschot qua vraag dat de prijs positief kan beïnvloeden. Dit verschil tussen aanbod en vraag zorgt ervoor dat het dalende risico wordt beperkt. Wanneer institutionele beleggers via ETF’s posities opbouwen, gebeurt dit bovendien vaak met een langere beleggingshorizon. Dat geeft de markt extra stabiliteit, zeker in een periode waarin onzekerheden rondom rente en macro-economie nog altijd spelen. Signaalfunctie voor beleggers Voor beleggers in de crypto markt hebben deze cijfers een signaalfunctie. Het vertrouwen dat grote institutionele spelers door miljarden te alloceren in gereguleerde beleggingsproducten bevestigt dat Bitcoin steeds meer gekocht wordt in de traditionele financiële wereld. Dit momentum werkt vaak door naar de bredere markt, omdat particuliere beleggers dit zien als bevestiging dat de trend omhoog sterker wordt. Ook technische analyse wijst op een belangrijke fase. De koers van Bitcoin beweegt rond de 118.000 dollar, een weerstandsniveau dat al meerdere keren is getest. Het momentum dat voortkomt uit de ETF instroom kan de kracht geven om dit niveau te doorbreken en een nieuwe fase van prijsstijging richting 120.000 dollar in te luiden. Op korte termijn richting de $120.000? Hoewel niemand met zekerheid kan voorspellen of Bitcoin dit niveau direct zal bereiken, biedt de huidige context sterke aanwijzingen dat de kans aanwezig is. De combinatie van record instroom, institutioneel vertrouwen en een gunstig technisch analyse vormt een krachtige mix. Beleggers doen er goed aan om rekening te houden met de invloed van externe factoren zoals beleidsbesluiten van de Federal Reserve. Best wallet - betrouwbare en anonieme wallet Best wallet - betrouwbare en anonieme wallet Meer dan 60 chains beschikbaar voor alle crypto Vroege toegang tot nieuwe projecten Hoge staking belongingen Lage transactiekosten Best wallet review Koop nu via Best Wallet Let op: cryptocurrency is een zeer volatiele en ongereguleerde investering. Doe je eigen onderzoek.   Het bericht Record instroom Bitcoin-ETF’s – richting $120.000? is geschreven door Timo Bruinsel en verscheen als eerst op Bitcoinmagazine.nl.
Paylaş
Coinstats2025/09/18 01:31