Cryptopolitan
2025-07-11 09:27:39

Fake startups target crypto users, infiltrating their wallets

Darktrace research reveals ongoing social engineering campaign targeting crypto users through fake startup companies. Scammers impersonate AI, gaming, and Web3 firms using spoofed social media accounts. Project documentation gets hosted on legitimate platforms like Notion and GitHub. The campaign continues changing since December 2024 targeting Web3 employees globally. Fake companies use legitimate platforms to build credible presence Threat actors create fake startup companies with AI, gaming, video meeting software themes. Web3 and social media company facades help target cryptocurrency users specifically. These operations use compromised X accounts typically with verification to contact victims. The attackers use legitimate platforms including Notion, Medium, and GitHub for documentation. Professional-looking websites include employee profiles, product blogs, whitepapers, and development roadmaps. X accounts appear compromised with higher follower counts adding to the appearance of legitimacy. The scammers remain active on social media accounts posting software development updates. Product marketing content gets shared regularly while campaigns operate across platforms. Eternal Decay blockchain game created fake conference presentation photos for credibility. The attackers even altered Italian exhibition photos making them appear as company presentations. Medium hosts blog posts about fake software products and company developments. Notion contains detailed product roadmaps and comprehensive employee listing information. Scammers altering photo from Italian exhibition: Source GitHub repositories feature technical software aspects using stolen open-source projects. Code names get changed to make repositories appear unique and original. Company registration information from Companies House gets linked to similar-named companies. Gitbook details company information and lists fake investor partnerships for credibility. Gameplay images stolen from Zombie Within game appear as Eternal Decay content. Some fake companies establish merchandise stores to complete business facades. These combined elements create convincing startup company appearances increasing infection success rates. Victims receive contact through X messages, Telegram, or Discord from employees. Fake workers offer cryptocurrency payments for software testing participation. Malware targeting both Windows and macOS crypto wallet users Windows versions are distributed via Electron apps that demand registration codes from impersonated employees. Bins are downloaded by users after codes are entered given via social media messaging. CloudFlare verification screens are presented prior to malware execution on target systems. The malware gathers system profiles in username, CPU details, RAM, and graphics. MAC addresses and system UUIDs are gathered in preliminary reconnaissance phases. Token-based authentication mechanisms use tokens which are derived from application launcher URLs. Stolen code signing certificates increase software legitimacy and evade security detection. Companies like Jiangyin Fengyuan Electronics Co. and Paperbucketmdb ApS certificates were used. Python gets retrieved and stored in temporary directories for command execution. macOS distributions are released as DMG files containing bash scripts and binaries. Scripts use obfuscation techniques like base64 encoding and XOR encryption. AppleScript mounts malware and runs executables from temporary directories automatically. The macOS malware performs anti-analysis checks for QEMU, VMWare, and Docker environments. Atomic Stealer targets browser data, crypto wallets, cookies, and document files. Stolen data gets compressed and sent via POST requests to servers. Additional bash scripts establish persistence through Launch Agent configurations at login. The malware logs active application usage and window information continuously. User interaction timestamps get recorded and transmitted to collection servers periodically. Both versions target cryptocurrency wallet data specifically for theft operations. Multiple fake companies distribute identical malware with different branding and themes. Extensive list of fake companies identified across multiple platforms Darktrace revealed several phony companies running through this social engineering campaign. Pollens AI impersonates collaborative creation tools using X accounts and other websites. Buzzu employs the same logos and code as Pollens but runs under different branding. Cloudsign is reported to provide document signing platform services to business consumers. Swox is a Web3 space next-generation social network. KlastAI is closely linked to Pollens accounts and sites bearing the same branding. Wasper uses the same logos and GitHub code as Pollens across various areas. Lunelior operates through various websites serving various groups of users in specific. BeeSync previously operated as Buzzu alias before its rebranding in January 2025. Slax hosts social media and AI-centric sites on multiple websites. Solune reaches users through social media platform activity and messaging app usage. Eternal Decay is a blockchain gaming firm with synthetic conference presentations. Dexis is branded the same as Swox and shared the same user base. NexVoo has multiple domains and social media platform management. NexLoop rebranded to NexoraCore by renaming GitHub repositories. YondaAI targets social media site users and various website domain users. Every business has professional fronts through real platform integration procedures. The CrazyEvil traffer group has been operating such campaigns since 2021. Recorded Future approximates CrazyEvil’s millions of revenue from malicious activities. The group is said to be behind attacks on crypto users, influencers, and DeFi professionals. The campaigns show extensive efforts in making legitimate business appearances. KEY Difference Wire : the secret tool crypto projects use to get guaranteed media coverage

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.