🎁 Airdrop Season 7 is LIVE - Answer Fun Questions to Earn $30K Prize Pool Rewards. JOIN NOW!

Cracked TradingView Premium Spreads Malware, Steals Crypto Wallets

Key Takeaways

  • ​Fake TradingView Premium installs malware that steals crypto wallets and login details;
  • Scammers use Reddit to promote infected software disguised as a cracked version;
  • The malware was traced to a Dubai website, with servers registered in Russia.​

Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥

Cracked TradingView Premium Spreads Malware, Steals Crypto Wallets

A new malware campaign is targeting crypto traders through a counterfeit version of TradingView Premium.

Malwarebytes, a cybersecurity company, has discovered that scammers are promoting a modified version of the platform, which secretly installs harmful software designed to steal personal information and drain crypto wallets.

According to a March 18 blog post, the fraudsters are active on crypto-related subreddits, where they post download links for what they claim is a cracked version of TradingView Premium.

What Is Tether? (USDT SIMPLY Explained With Animations)

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

According to Jerome Segura, a senior researcher at Malwarebytes, these posts include Windows and Mac installers that contain two types of malware, Lumma Stealer and Atomic Stealer.

Lumma Stealer, identified in 2022, is known for extracting login details, cryptocurrency wallet credentials, and data from two-factor authentication (2FA) browser extensions. Atomic Stealer, which surfaced in 2023, goes after passwords stored in system keychains, including administrator credentials.

Victims of this malware have reported losing their crypto holdings, with scammers even taking control of their accounts to send phishing messages to their contacts.

Additionally, Segura explained, "Files are double zipped, with the final zip being password protected. For comparison, a legitimate executable would not need to be distributed in such fashion". This tactic prevents antivirus programs from detecting harmful files before they are extracted and executed.

Investigations into the origins of the malware revealed that the files were hosted on a website linked to a Dubai cleaning company, while the command-and-control server was registered in Russia just a week before it was discovered.

Recently, Microsoft identified a new remote access Trojan (RAT) called StilachiRAT. What does this malware do? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

$600 WELCOME BONUS

Earn Huge Exclusive Binance Learners Rewards
5.0 Rating