Researchers of Darktrace, working in the field of cybersecurity, warned that attackers use a new sophisticated method of social engineering to spread malicious software that stole cryptocurrency.

Darktrace found out that scammers are associated with potential victims in the social networks X, Telegram or Discord and offer people rewards in cryptocurrency if they take part in testing software. Fraudsters pretend to be startups in the field of artificial intelligence (AI), games and Web3, deceiving users to load infected programs. Attackers use other people’s compromised accounts in X, as well as project documentation and roadmaps published on legal platforms to create the illusion of believability.

Having agreed to participate in testing, users redirect to fake websites of companies that imitate real startups. After loading the malicious application, users have a Cloudflare verification screen, where the virus imperceptibly collects systemic information: data on the processor, MAC address and user identifier. These data are sent to the attacker server. Then he extracts the confidential information of the victim, including data for entering the crypto -coolant.

Researchers Darktrace have found versions of this malicious program for both Windows and MacOS systems. Darktrace suggested that attackers use methods similar to those used by the Crazy Evil hacker group, attacking cryptocurrency communities. This group of hackers impersonate companies operating in the field of blockchain, publishing vacancies, and then abducts digital assets with job applicants.

Earlier, SlowMist blockchain security specialists reported crypto-meshs who send phishing links to the Zoom platform for video conferences.