Mobile Malware Uses OCR to Steal Wallet Seed Phrases from Screenshots
The SparkCat and SpyAgent malware strains weaponize Optical Character Recognition to exploit the human layer, reading and exfiltrating private keys stored as device images.
User Endpoints Compromised by LeakyInjector LeakyStealer Malware Duo
The LeakyStealer malware family uses low-level API injection via LeakyInjector to bypass detection and systematically drain browser-based crypto wallets.
Users Targeted by Lone None Stealer via Fake Copyright Phishing
Sophisticated phishing leverages DLL side-loading and clipboard hijacking, enabling silent cryptocurrency diversion and data exfiltration from unsuspecting users.
