Close Menu
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
Trending

Across’s acx rockets 80%, massively beating bitcoin, on plans to dump its DAO structure

22 minutes ago

The Honest Number Behind AI Agent Payments: a16z

25 minutes ago

Brickbat: You Don’t Have To Go Home, but You Can’t Stay Here

1 hour ago
Facebook X (Twitter) Instagram
Facebook X (Twitter) Discord Telegram
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Market Data Newsletter
Thursday, March 12
  • Home
  • News
    • Politics
    • Legal & Courts
    • Tech & Big Tech
    • Campus & Education
    • Media & Culture
    • Global Free Speech
  • Opinions
    • Debates
  • Video/Live
  • Community
  • Freedom Index
  • About
    • Mission
    • Contact
    • Support
FSNN | Free Speech News NetworkFSNN | Free Speech News Network
Home»Cryptocurrency & Free Speech Finance»Warning: WhatsApp worm targets Brazilian crypto wallets, bank accounts
Cryptocurrency & Free Speech Finance

Warning: WhatsApp worm targets Brazilian crypto wallets, bank accounts

News RoomBy News Room4 months agoNo Comments3 Mins Read1,324 Views
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
Warning: WhatsApp worm targets Brazilian crypto wallets, bank accounts
Share
Facebook Twitter Pinterest Email Copy Link

Listen to the article

0:00
0:00

Key Takeaways

Playback Speed

Select a Voice

Brazilian crypto holders are urged to be on the lookout for a sophisticated hacking campaign that includes a hijacking worm and banking trojan shared via WhatsApp messages. 

According to a new report from Trustwave’s cybersecurity research team SpiderLabs, the banking trojan, known as “Eternidade Stealer” is being pushed via social engineering on messaging application WhatsApp such as “fake government programs, delivery notifications,” messages from friends and fraudulent investment groups. 

“WhatsApp continues to be one of the most exploited communication channels in Brazil’s cybercrime ecosystem. Over the past two years, threat actors have refined their tactics, using the platform’s immense popularity to distribute banker trojans and information-stealing malware,” said Spiderlabs researchers Nathaniel Morales, John Basmayor, and Nikita Kazymirskyi.

Explaining the process in Layman’s terms, clicking the worm link in WhatsApp sets off a chain reaction that infects the victim with both the worm and banking trojan. 

The worm hijacks the account and obtains the victim’s contact list. It utilizes “smart filtering” to ignore business contacts and groups to target individual contacts for a more efficient process. 

Meanwhile, the banking trojan is a file automatically downloaded onto the victim’s device that deploys the Eternidade Stealer in the background, which is able to scan for financial data and logins to a range of Brazilian banks and fintech or crypto exchanges and wallets. 

Infographic explaining how the malware attacks devices and how the hack progresses. Source: SpiderLabs

Related: Crypto private key theft is now big business: Here’s what to know

The malware also has a clever way to avoid detection or being shutdown. Instead of having a fixed server address, it utilizes a pre-set gmail account to check for new commands via email. This enables the hackers to change commands by sending new emails. 

“One notable feature of this malware is that it uses hardcoded credentials to log into its email account, from which it retrieves its C2 server. It is a very clever way to update its C2, maintain persistence, and evade detections or takedowns on a network level. If the malware cannot connect to the email account, it uses a hardcoded fallback C2 address,” the report reads. 

How to stay safe

Users of apps such as WhatsApp are advised to tread with caution with any link sent to them, even if it’s from a trustworthy contact. 

A helpful tactic can be to message them on a separate app to confirm if the link is okay, and to be suspicious of a link sent out of the blue with limited context given.