A recent report from research firm ReversingLabs has uncovered a concerning security vulnerability within Ethereum smart contracts. Hackers have discovered a method for concealing malicious code, potentially posing […]
New Malware Hiding Technique Targets Ethereum Smart Contracts
Hackers have developed a novel method to conceal malware within Ethereum smart contracts, posing a new challenge for security systems. ReversingLabs researchers discovered two malicious JavaScript packages, ‘colortoolsv2’ […]
Ethereum Smart Contracts Enable New Malware Hiding Methods
Cyberattacks are getting increasingly sophisticated, with hackers now using Ethereum smart contracts to hide malware commands and evade detection systems. The discovery highlights a new challenge for security […]
Ethereum Smart Contracts Used in Malware Concealment: Hackers Target Developers
New findings from ReversingLabs reveal a sophisticated attack that exploited Ethereum’s smart contracts to inject malware into open-source software repositories like npm and GitHub. This tactic allows hackers […]
New Malware Leverages Ethereum Smart Contracts for Stealthy Deployment
A sophisticated new malware technique has emerged, utilizing the anonymity and security features of Ethereum smart contracts to evade detection by traditional security systems. Threat actors have developed […]
Hackers Hide Malware in Ethereum Contracts: New Attack Vector
Threat actors have found a clever way to deliver malicious software and commands hidden within Ethereum smart contracts. This technique evades security scans as attacks on code repositories […]
Discord Invite Links Targeted for Crypto Malware Campaign
A new malware campaign targeting cryptocurrency users via compromised Discord invite links has been uncovered. This method exploits a vulnerability in the platform’s invitation system, allowing malicious actors […]
Crypto Malware Threat: The Rise of Silent Thieves
A new wave of crypto malware is sweeping across the digital asset world, striking with advanced tactics designed to exploit users’ trust while they sleep. Two notorious groups […]
New Malware Threat: Crocodilus Poses a Serious Risk to Global Finances
A highly sophisticated malware dubbed ‘Crocodilus’ has emerged as a major threat to global financial security. This Android-focused threat specifically targets users of banking and cryptocurrency applications, posing […]
Lazarus Group Leverages New OtterCookie Malware to Target Web3 Professionals
A new malware threat has emerged, orchestrated by the notorious Lazarus Group, a state-sponsored hacking collective linked to North Korea. The group’s latest weapon is the OtterCookie malware, […]
Crocodilus Malware Spreads Globally, Targeting Crypto Wallets for Financial Gain
A new wave of sophisticated malware targeting crypto wallets has emerged, impacting financial security across the globe. ThreatFabric, a cybersecurity firm, reported on June 3, 2025, that Crocodilus […]
New Malware Hijacks Crypto Wallets Using Captcha Deceptions
A new type of malware called EDDIESTEALER has been discovered, posing a serious threat to cryptocurrency users’ security. Developed using the Rust programming language, this sophisticated attack leverages […]
Crypto Mining Malware Exploits Docker, Attacks Privacy Coin Dero
A new Linux malware is targeting vulnerable Docker infrastructures worldwide, turning them into decentralized mining networks for privacy coin Dero. The self-replicating malware exploits unauthenticated Docker API access […]
macOS Users at Risk: New Malware Steals Cryptocurrency from Ledger Live App
A sophisticated malware campaign targeting macOS users with cryptocurrency holdings has emerged, using a fake version of the popular Ledger Live application to steal valuable cryptocurrency wallet seed […]
Cybercriminals Target macOS Users With Phishing Attacks Using Fake Ledger Live Apps
Cybercriminals are exploiting the popularity of cryptocurrency wallets, specifically those using Ledger Live on macOS devices, by creating fake applications to steal users’ sensitive data. A cybersecurity firm, […]