Connect with us

Noticias

Another malicious application disguised as MetaMask

A new malicious clipper application disguised as Ethereum wallet MetaMask was discovered in the Google Play app store. This was reported by the company Eset. As security specialist Lukas Stefanko writes in the company's blog, the purpose of the application was to steal data needed to gain access to users' Ethereum wallets. In particular, it could replace the addresses of the purses copied to the clipboard with the addresses of hackers. […]

Published

on

was detected on Google Play

A new malicious clipper application disguised as Ethereum wallet MetaMask was discovered in the Google Play app store. This was reported by the company Eset.

As security specialist Lukas Stefanko writes in the company's blog, the purpose of the application was to steal data needed to gain access to users' Ethereum wallets. In particular, it could replace the addresses of the purses copied to the clipboard with the addresses of hackers.

"This attack is aimed at users of the mobile version of the MetaMask service, designed to launch decentralized Ethereum-based applications […] Currently, this service, however, does not have a mobile application – only extensions for desktop browsers such as Chrome and Firefox", – wrote Stefanko.

The application was discovered shortly after its appearance on Google Play on February 1 and has now been removed from the store. As Stefanko noted, such a clipper hit Google Play for the first time – previously there were already malicious applications posing as MetaMask, but they were only able to steal critical information to gain access to the victim’s cryptocurrency funds.

Google claims to regularly scan more than 50 billion applications for viruses, backdoors, spyware, phishing tools, spam, and various tricks that allow fraudsters to access devices and personal user data. Despite this, cybersecurity experts regularly find malware that is disguised as games, television applications and programs for remote control.

Recall that in November last year, Eset discovered four fake cryptocurrency wallet on Google Play, stealing personal data. In particular, they imitated wallets for Neo (NEO), Tether (USDT) and Ethereum (ETH). The latter also impersonated MetaMask.

Subscribe to the BlockchainJournal news in Telegram: BlockchainJournal Live – the entire news feed, BlockchainJournal – the most important news and polls.

<< aside id = "unisender_subscribe_form-10" class = "widget unisender_form">

BlockchainJournal.news

BlockchainJournal.news

Compañías

ARK Invest Deshace Acciones de Coinbase y GBTC por Millones en Medio del Auge del Mercado

Published

on

ARK Invest: $33 Millones en Acciones de Coinbase y $5.9 Millones en GBTC

ARK Invest, liderada por Cathie Wood, continúa navegando sus movimientos estratégicos de acciones en el mercado, realizando ventas destacadas de acciones de Coinbase y Grayscale Bitcoin Trust (GBTC) en medio del continuo aumento de los precios del mercado.

(más…)

Continue Reading

Compañías

El Descuento de GBTC se Reduce a Medida que Aumenta el Precio de Bitcoin

Published

on

By

El Descuento de GBTC se Reduce a Medida que Aumenta el Precio de Bitcoin

Grayscale Bitcoin Trust (GBTC), uno de los vehículos de inversión en criptomonedas más grandes y populares, ha visto su descuento reducirse significativamente en los últimos días a medida que los alcistas continúan elevando su precio. Según datos de Kaiko, una plataforma de inteligencia blockchain, el descuento del GBTC, que mide la diferencia entre el precio de mercado y el valor liquidativo (NAV) del fideicomiso, está en su nivel más estrecho en años, con solo el 8% hasta ayer. (más…)

Continue Reading

Compañías

IBM Presenta OSO, Diseñada Para el Almacenamiento en Frío de Activos Digitales

Published

on

By

ibm featured

IBM presentó una nueva tecnología denominada «IBM Hyper Protect Offline Signing Orchestrator» (OSO), diseñada para gestionar activos digitales en almacenamiento en frío. Esta innovación surge como respuesta a los riesgos asociados con los procedimientos manuales y tiene como objetivo mantener los activos a una distancia segura de las conexiones a Internet. (más…)

Continue Reading

Trending