Google Play Store again in the storm of controversies

Another cryptocurrency theft is in the books!
The crypto arena, since its inception has been thronged with heist. The virtual assets seem to beguile some of the most malicious players in the industry. The rising popularity of cryptocurrencies has attracted both thieves & investors in equal measures. It has led to significant increase in both crimes & disputes related to digital assets. As Crypt-o-currency Mining Apps have been banned by Google from the official Play Store, threat actors are adopting shady tactics to swindle victim’s crypto currency wallets.
Clipper Malware
Recent research reveals that a malicious app designed to steal cryptocurrency has been discovered on Google play, the official Android App Store. Classified as clipper, the malware is configured to intercept victim’s device’s clipboard & replace their wallet address stealthily with the one belonging to the attacker.
Earlier, similar cryptocurrency stealers leveraging clipboard hijacking techniques were found on Windows & shady Android app Stores. However, it was the first time that such a devious app hosting the malicious android clipper was incorporated in the official Google Play Store. The app was masqueraded as a mobile version of MetaMask, a legitimate cryptocurrency service on desktop devices.

What is Metamask & how does Android clipper leverages the cryptocurrency service?

MetaMask is a legitimate service, designed to interact with the Ethereum decentralized apps in a browser without having to run a full Ethereum node. For users, it works as an Ethereum wallet, allowing them to store & send any standard Ethereum compatible tokens.
Metamask App Malware
Addresses on the online cryptocurrency wallets are composed of long strings of characters. Users instead of memorizing & typing them tend to copy and paste the address using clipboard. The Android clipper impersonates the legitimate service of this online cryptocurrency wallet. The Bitcoin or Ethereum wallet address copied to the clipboard is replaced with the one belonging to the threat actors by this malice.
Read More :- Click here

Comments

Popular posts from this blog

How to remove Speedtest-guide.com redirect from your system

The novel DNS protocol helps Mozart Malware evade detection

How to remove ZUpdater.exe Trojan from your system?