Web3 Users Targeted by Evolving Social Engineering Malware Campaign
The attack leverages sophisticated social engineering to trick high-value users into installing a malicious binary, fundamentally bypassing smart contract security.
Users Targeted by Lone None Stealer via Fake Copyright Phishing
Sophisticated phishing leverages DLL side-loading and clipboard hijacking, enabling silent cryptocurrency diversion and data exfiltration from unsuspecting users.
NPM Debug Package Compromised via Phishing, Redirecting Crypto Transactions
A compromised NPM package, widely integrated into browser-based applications, enabled malicious redirection of user cryptocurrency transactions.
NPM Supply Chain Compromise Enables Widespread Cryptocurrency Wallet Drains
A phishing-induced compromise of a critical NPM developer account injected malicious code, enabling silent cryptocurrency address substitution during transactions.
North Korean Hackers Deploy BeaverTail Malware via Fake Crypto Job Offers
A sophisticated social engineering campaign leverages fake job opportunities to distribute advanced malware, directly compromising user credentials and crypto wallets.
Crypto Developers Targeted by Phishing Malware Campaign
Attackers leverage social engineering to distribute macOS malware, compromising sensitive user data and risking asset theft.
