A new report from U.S. cybersecurity firm Socket reveals that North Korean hackers have utilized the popular software repository npm to distribute over 300 packages containing malicious code. […]
Crypto Users Targeted by New Malware ‘ModStealer’ as Hackers Target Digital Wallets
A newly discovered malware called ModStealer is posing a significant threat to crypto users on various operating systems. This infostealer, capable of stealing cryptocurrency wallet details and credentials, […]
New Malware Threatens Crypto Wallets: ModStealer Steals Keys and Extensions
A newly discovered malware called ModStealer poses a significant threat to cryptocurrency wallets. This stealthy virus, capable of bypassing security measures, targets various operating systems including macOS, Windows, […]
Cross-Platform Crypto Heist: The Rise of ModStealer Malware
A new, highly sophisticated cyber threat is emerging, targeting crypto developers and their digital assets. Dubbed ModStealer, this cross-platform malware has the potential to compromise thousands of users’ […]
ModStealer Malware Steals Crypto Keys, Threatens Users across Platforms
A new malware dubbed ModStealer has emerged, targeting cryptocurrency users and posing a significant threat to digital assets. This undetected malware is hidden within fake recruitment ads on […]
ModStealer Malware Threatens Crypto Wallets Across Platforms
A new cross-platform malware known as ModStealer has emerged, posing a significant threat to crypto wallet security. According to Mosyle, a cybersecurity firm, this sophisticated malware can evade […]
Cross-Platform Malware Targets Browser Wallet Credentials, Threatening Crypto Security
A new malware strain dubbed ModStealer has emerged, targeting cryptocurrency wallet data across Windows, Linux, and macOS platforms. This stealthy threat operates by mimicking background helper programs to […]
DuckDB NPM Account Hack Leads to New Malware Release: Security Concerns Raised
A critical security breach has exposed vulnerabilities in open-source software, potentially impacting developers and raising concerns about the safety of digital finance. The DuckDB project’s NPM account was […]
DuckDB NPM Account Compromised, Leading to Malicious Software Release
SlowMist Technology’s Chief Information Security Officer, 23pds, revealed that the DuckDB NPM account was compromised earlier today. As a result, malicious versions of DuckDB and duckdb-wasm were released. […]
Malicious Code Injection Threatens Popular npm Packages
A phishing attack has impacted renowned developer qix, leading to malicious code being injected into popular npm packages: chalk, strip-ansi, and color-convert. This attack exploited wallet functions, altered […]
Hackers Hide Malware Using Ethereum Smart Contracts in NPM Packages
New research reveals hackers are leveraging blockchain technology to deliver malware disguised as legitimate code. This tactic has been found by cybersecurity firm ReversingLabs, who discovered two malicious […]
Hackers Use Ethereum Contracts to Hide Malware in Open-Source Libraries
Cybercriminals are increasingly turning to Ethereum smart contracts to disguise malicious code within open-source libraries, making detection and removal more challenging. Research by ReversingLabs reveals that hackers are […]
Ethereum Smart Contracts Targeted in JavaScript Malware Campaign
A new malware campaign has reportedly exploited Ethereum smart contracts to distribute JavaScript malware, according to ReversingLabs security firm. The campaign utilizes npm packages like `colortoolsv2` and a […]
How Hackers are Hiding Malware Inside Ethereum Smart Contracts
Cybercriminals are increasingly leveraging the power and secrecy of Ethereum smart contracts to hide malicious code. This new approach makes malware detection significantly harder, posing a significant challenge […]
Ethereum Smart Contracts Become Weapon in New Malware Tactics
Cybersecurity experts are raising alarms after hackers are increasingly using Ethereum smart contracts to disguise malicious code within their attacks. These so-called “supply chain attacks” exploit the anonymity […]