Skip to content

xpool.eu

crypto news aggregator

Crypto Security Ethereum Malware

Hidden Malware Threat Identified in Ethereum Smart Contracts

Posted on: September 4, 2025

A recent report from research firm ReversingLabs has uncovered a concerning security vulnerability within Ethereum smart contracts. Hackers have discovered a method for concealing malicious code, potentially posing […]

Cryptosecurity Ethereum Malware

New Malware Hiding Technique Targets Ethereum Smart Contracts

Posted on: September 4, 2025

Hackers have developed a novel method to conceal malware within Ethereum smart contracts, posing a new challenge for security systems. ReversingLabs researchers discovered two malicious JavaScript packages, ‘colortoolsv2’ […]

Blockchain Ethereum Malware

Ethereum Smart Contracts Enable New Malware Hiding Methods

Posted on: September 4, 2025

Cyberattacks are getting increasingly sophisticated, with hackers now using Ethereum smart contracts to hide malware commands and evade detection systems. The discovery highlights a new challenge for security […]

Ethereum Malware Software Supply Chain

Ethereum Smart Contracts Used in Malware Concealment: Hackers Target Developers

Posted on: September 4, 2025

New findings from ReversingLabs reveal a sophisticated attack that exploited Ethereum’s smart contracts to inject malware into open-source software repositories like npm and GitHub. This tactic allows hackers […]

Ethereum Malware Security

New Malware Leverages Ethereum Smart Contracts for Stealthy Deployment

Posted on: September 4, 2025

A sophisticated new malware technique has emerged, utilizing the anonymity and security features of Ethereum smart contracts to evade detection by traditional security systems. Threat actors have developed […]

Cybersecurity Ethereum Malware

Hackers Hide Malware in Ethereum Contracts: New Attack Vector

Posted on: September 4, 2025

Threat actors have found a clever way to deliver malicious software and commands hidden within Ethereum smart contracts. This technique evades security scans as attacks on code repositories […]

Cryptocurrency Discord Malware

Discord Invite Links Targeted for Crypto Malware Campaign

Posted on: June 14, 2025

A new malware campaign targeting cryptocurrency users via compromised Discord invite links has been uncovered. This method exploits a vulnerability in the platform’s invitation system, allowing malicious actors […]

Cryptosecurity Cybercrime Malware

Crypto Malware Threat: The Rise of Silent Thieves

Posted on: June 11, 2025

A new wave of crypto malware is sweeping across the digital asset world, striking with advanced tactics designed to exploit users’ trust while they sleep. Two notorious groups […]

Cryptocurrency Fintech Malware

New Malware Threat: Crocodilus Poses a Serious Risk to Global Finances

Posted on: June 6, 2025

A highly sophisticated malware dubbed ‘Crocodilus’ has emerged as a major threat to global financial security. This Android-focused threat specifically targets users of banking and cryptocurrency applications, posing […]

Crypto Security Lazarus Group Malware

Lazarus Group Leverages New OtterCookie Malware to Target Web3 Professionals

Posted on: June 6, 2025

A new malware threat has emerged, orchestrated by the notorious Lazarus Group, a state-sponsored hacking collective linked to North Korea. The group’s latest weapon is the OtterCookie malware, […]

Cryptocurrency Cybersecurity Malware

Crocodilus Malware Spreads Globally, Targeting Crypto Wallets for Financial Gain

Posted on: June 3, 2025

A new wave of sophisticated malware targeting crypto wallets has emerged, impacting financial security across the globe. ThreatFabric, a cybersecurity firm, reported on June 3, 2025, that Crocodilus […]

Cryptosecurity Cyberattack Malware

New Malware Hijacks Crypto Wallets Using Captcha Deceptions

Posted on: May 30, 2025

A new type of malware called EDDIESTEALER has been discovered, posing a serious threat to cryptocurrency users’ security. Developed using the Rust programming language, this sophisticated attack leverages […]

Cryptocurrency Dero Malware

Crypto Mining Malware Exploits Docker, Attacks Privacy Coin Dero

Posted on: May 29, 2025

A new Linux malware is targeting vulnerable Docker infrastructures worldwide, turning them into decentralized mining networks for privacy coin Dero. The self-replicating malware exploits unauthenticated Docker API access […]

Cryptocurrency Malware Security

macOS Users at Risk: New Malware Steals Cryptocurrency from Ledger Live App

Posted on: May 23, 2025

A sophisticated malware campaign targeting macOS users with cryptocurrency holdings has emerged, using a fake version of the popular Ledger Live application to steal valuable cryptocurrency wallet seed […]

Cryptocurrency Cybersecurity Malware

Cybercriminals Target macOS Users With Phishing Attacks Using Fake Ledger Live Apps

Posted on: May 23, 2025

Cybercriminals are exploiting the popularity of cryptocurrency wallets, specifically those using Ledger Live on macOS devices, by creating fake applications to steal users’ sensitive data. A cybersecurity firm, […]

Posts pagination

Previous page Page 1 Page 2 Page 3 … Page 5 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG BNB Cardano Chainlink Coinbase Crypto Cryptocurrency Crypto Market Crypto Presale Crypto Regulation DeFi Dogecoin ETF ETFs Ethereum Finance Fintech Institutional Investment Investment Market Analysis Market Trends Market Volatility Meme Coin Meme Coins Presale Price Prediction Regulation Ripple SEC Shiba Inu Solana Stablecoin Stablecoins Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}