SomJournal.com
  • Som Podcast
  • Som Premium
  • Job Opportunities
Donation
Contact Us
  • World
    • Middle East
    • Africa
    • Asia
    • US & Canada
    • Europe
    • Asia Pacific
  • Economy
  • OPINION
  • Sports
    • Football
    • Basketball
    • Tennis
    • Athletics
  • More
    • Videos
  • Login
  • Register
  • en English
    ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
  • World
    • Middle East
    • Africa
    • Asia
    • US & Canada
    • Europe
    • Asia Pacific
  • Economy
  • OPINION
  • Sports
    • Football
    • Basketball
    • Tennis
    • Athletics
  • More
    • Videos
  • Login
  • Register
  • en English
    ar Arabiczh-CN Chinese (Simplified)nl Dutchen Englishfr Frenchde Germanit Italianpt Portugueseru Russianes Spanish
No Result
View All Result
SomJournal.com
No Result
View All Result
Home Crypto News

CEO of Binance Warns Users About New Hack Targeting Cryptocurrency Industry

SomJournal by SomJournal
8 December 2022
Reading Time: 5 mins read
0
Source: AdobeStock / SomYuZu

CEO of the major crypto exchange Binance Changpeng ‘CZ’ Zhao took to Twitter to warn about the latest hack type targeting the cryptoverse – one executed by “the threat actor [with] broad knowledge of the cryptocurrency industry.”

“Don’t download files!”, said CZ on Tuesday. 

He went on to explain that users may receive a file from a friend, but that that friend may have already been compromised. This person may share “a weaponized Excel file” with the name “exchange fee comparision.xls”, which contains a malicious code, among other threats, targeting crypto funds.

CZ referred to a Microsoft Security Threat Intelligence blog post published this Tuesday, which discusses “targeted attacks against the cryptocurrency industry.”

The blog post states that, given the rise of the crypto market over the past several years, it hasn’t attracted the attention of only investors – but of threat actors too, who directly target organizations within the cryptocurrency industry for financial gain.

They found that, 

“Attacks targeting this market have taken many forms, including fraud, vulnerability exploitation, fake applications, and usage of info stealers, as attackers attempt to get their hands on cryptocurrency funds.”

Don’t trust your friends

There are also novel tactics being developed, the report said, one of which was employed by a treat actor tracked as DEV-0139 (a designation as a temporary name given to an unknown cluster of threat activity until they are identified and named). 

“We are also seeing more complex attacks wherein the threat actor shows great knowledge and preparation, taking steps to gain their target’s trust before deploying payloads,” said the report.

DEV-0139 joined Telegram chat groups to target crypto investment companies. They facilitated communication between VIP clients and crypto exchanges, then identified their target from among the members. 

The threat actor posed as representatives of another crypto investment company, and in October 2022 invited the target to a different chat group where they pretended to ask for feedback on the fee structure used by exchanges. 

“The threat actor had a broader knowledge of this specific part of the industry, indicating that they were well prepared and aware of the current challenge the targeted companies may have,” the team said.

However, after gaining the target’s trust, DEV-0139 sent a weaponized Excel file that included names of major exchanges, titled ‘OKX Binance & Huobi VIP fee comparision.xls’, which contained several tables about fee structures among exchanges. Notably, “the data in the document was likely accurate to increase their credibility.”

The attack

The weaponized Excel file initiates a series of activities, per the report. It starts with a macro, which is an action or a set of actions that can be recorded and executed as many times and as often as needed – when users create a macro, mouse clicks and keystrokes are recorded.

In this hack, a malicious macro in the file works to obfuscate certain relevant codes and retrieve some data. It will then drop another Excel sheet into C:ProgramDataMicrosoft Media and execute it in invisible mode. The file then downloads a PNG file containing three executables: a legitimate Windows file, a malicious version of an executable file, and an encoded backdoor.

All this combined “lets the threat actor remotely access the infected system.”

Source: microsoft.com

And there is more

The report stated that the team discovered yet another file that uses a similar technique, but instead of a malicious Excel file, it is delivered in an MSI (Microsoft Software Installer) package for a CryptoDashboardV2 application, dated June 2022. 

“This may suggest other related campaigns are also run by the same threat actor, using the same techniques,” it said.

How to defend yourself

The report stated that DEV-0139 has “a broad knowledge of the cryptocurrency industry,” and that both big and small companies may become targets.

The techniques used by the threat actor can be mitigated by adopting the suggested security considerations, they said. While these are instructions for companies, an individual can use the measures to protect themselves as well:

  • change Excel macro security settings to control which macros run and under what circumstances when a workbook is opened; 
  • turn on attack surface reduction rules to prevent common attack techniques observed above;
  • ensure that Microsoft Defender Antivirus is up to date and that real-time behavior monitoring is enabled;
  • use the included indicators of compromise to investigate whether they exist in your environment and assess for potential intrusion;
  • educate end users about protecting personal and business information in social media, filtering unsolicited communication, identifying lures in spear-phishing emails and watering holes, and reporting of reconnaissance attempts and other suspicious activity;
  • educate end users about preventing malware infections, such as ignoring or deleting unsolicited and unexpected emails or attachments sent via instant messaging applications or social networks;
  • encourage end users to practice good credential hygiene and make sure the Microsoft Defender Firewall is always on.

The crypto industry, be it companies or individuals, has become a common target of various types of attacks. You can find out more about this issue here. 

____

Learn more: 
– Binance CEO Warns Users to Be Vigilant as Dark Web Hackers Auction Off 500 Million Whatsapp Numbers
– Binance CEO Says They’re Closer to Identifying Hacker Behind $570,000,000 Exploit

– 25 Year-Old Hacker Jailed For Stealing $20 Million in Crypto – Find Out How He Did It
– DeFi Protocol Ankr Suffers Infinity Minting Exploit – Here’s What Happened

RELATED POSTS

Bitcoin Price Prediction as $35 Billion Trading Volume Comes In – Can BTC Hit a New All-Time High in 2023?

Got Bitcoin? US Senator Ted Cruz Introduces Bill To Enable Crypto Payments on Capitol Hill

White House Asks for Public Comments on Crypto Assets, Blockchain Technology and Decentralized Finance

Source link

SomJournal

SomJournal

This is an online news portal that aims to share the latest Somalia, Somaliland, and Djibouti updates and much more stuff like that.

Related Posts

Crypto News

Bitcoin Price Prediction as $35 Billion Trading Volume Comes In – Can BTC Hit a New All-Time High in 2023?

29 January 2023
Crypto News

Got Bitcoin? US Senator Ted Cruz Introduces Bill To Enable Crypto Payments on Capitol Hill

29 January 2023
Crypto News

White House Asks for Public Comments on Crypto Assets, Blockchain Technology and Decentralized Finance

28 January 2023
Crypto News

The Central Bank of Saudi Arabia is Discussing CBDC

28 January 2023
Crypto News

Terra Luna Classic Price Prediction – Can LUNC Hit $3 in 2023?

28 January 2023
Crypto News

California DMV to Use Blockchain Technology for Record Keeping

28 January 2023
Next Post

Bulk tea prices seen higher amid supply hit, ICRA says

Missouri marijuana law has changed—but there's some confusion

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Bitcoin Price Forecasts For 2023 Are In and Here’s What The Bulls and Bears Think

3 weeks ago

Game of Thrones extra swaps television set for financial firm

2 years ago

Popular News

  • How to Buy a Tom Brady NFT: A Beginner’s Guide

    0 shares
    Share 0 Tweet 0
  • Elon Musk sets aside his strained relationship with Joe Biden to meet with top White House aides

    0 shares
    Share 0 Tweet 0
  • Key infrastructure-gap projects to get a Budget push

    0 shares
    Share 0 Tweet 0
  • India’s Dalits seek to reclaim dignity by pushing back on insulting baby names

    0 shares
    Share 0 Tweet 0
  • Ugandan sports, music success without govt help

    0 shares
    Share 0 Tweet 0
  • Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions

What’s New Here!

  • Asia’s first Lollapalooza festival rocks India in biggest music event since the pandemic
  • War with China over Taiwan likely in 2025, warns U.S. general
  • Red flags that impede Somalia’s quest to join East African Community

Subscribe Now

Loading

About Us

This is an online news portal that aims to share latest Somalia, Somaliland and Djibouti updates and much more stuff like that.

© 2021 SomJournal

No Result
View All Result
  • Account
  • Cart
  • Change Password
  • Checkout
  • Contact
  • Contact Us
  • Disclaimer
  • DMCA
  • Donation
  • Forgot Password?
  • Home
  • Job Opportunities
  • My account
  • Podcast
  • Premium Content
  • Privacy Policy
  • Privacy Policy
  • Reset Password
  • Shop
  • Somali Entrepreneurs
  • SomJournal.com – Daily Somalia News Updates
  • Subscribe
  • Terms of Use
  • Terms of Use
  • Voorbeeld pagina
  • WPR Account
  • WPR Login
  • WPR Logout
  • WPR Password Reset
  • WPR Profile
  • WPR Register

© 2021 SomJournal

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

SAVE & ACCEPT

Login

Register

Forgotten Password?

Register | Lost your password?
| Back to Login
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?