GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

[ad_1]


Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and cryptocurrency investors under the guise of open-source projects hosted on GitHub.
The campaign, which spans hundreds of repositories, has been dubbed GitVenom by Kaspersky.
“The infected projects include an automation instrument for interacting with Instagram accounts, a Telegram bot that enables

[ad_2]

Source link

Related posts:

Stay Safe Online: Essential Tips for Safer Internet Day

Technology

Is Your Phone Your Best Friend or a Silent Spy?

Technology

Wipe Your Digital Footprints with Data Wipe Software

Technology

No, you’re not fired – but beware of job termination scams

Technology

DeceptiveDevelopment targets freelance developers

Technology

Fake job offers target coders with infostealers

Technology

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Technology

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

Technology

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

Technology

Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads

Technology

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

Technology

Three Password Cracking Techniques and How to Defend Against Them

Technology

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

Technology

SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

Technology

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

Technology

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

Technology

AI-Powered Social Engineering: Ancillary Tools and Techniques

Technology

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

Technology

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Technology

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

Technology

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Technology

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

Technology

CISO's Expert Guide To CTEM And Why It Matters

Technology

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

Technology

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

Technology

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

Technology

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Technology

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

Technology

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Technology

Debunking the AI Hype: Inside Real Hacker Tactics

Technology

Build a website that pays you back with real revenue.

See also  SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

Leave a Reply

Your email address will not be published. Required fields are marked *

×