Connect with us

    Hi, what are you looking for?

    Cryptocurrency

    Crypto Firm Sounds Alarm Over $500K Hack Via Malicious Code Drop

    Cryptocurrency Phishing
    Cryptocurrency Phishing

    Kaspersky GReAT (Global Research and Analysis Team) experts have discovered open-source packages that download the Quasar backdoor and a stealer designed to exfiltrate cryptocurrency. The malicious packages are intended for the Cursor AI development environment, which is based on Visual Studio Code — a tool used for AI-assisted coding.

    The malicious open-source packages are extensions hosted in the Open VSX repository that claim to provide support for the Solidity programming language. However, in practice, they download and execute malicious code on users’ devices.

    During an incident response, a blockchain developer from Russia reached out to Kaspersky after installing one of these fake extensions on his computer, which allowed attackers to steal approximately $500,000 worth of crypto assets.

    The threat actor behind these packages managed to deceive the developer by making the malicious package rank higher than the legitimate one. The attacker achieved this by artificially inflating the malicious package’s downloads count to 54,000.

    After installation, the victim gained no actual functionality from the extension. Instead, malicious ScreenConnect software was installed on the computer, granting threat actors remote access to the infected device.

    Using this access, they deployed the open-source Quasar backdoor along with a stealer that collects data from browsers, email clients, and crypto wallets. With these tools, the threat actors were able to obtain the developer’s wallet seed phrases and subsequently steal cryptocurrency from the accounts.

    After the malicious extension downloaded by the developer was discovered and removed from the repository, the threat actor republished it and artificially inflated its installation count to a higher number – 2 million, compared to 61,000 for the legitimate package. The extension was removed from the platform following a request from Kaspersky.

    “Spotting compromised open-source packages with the naked eye is becoming increasingly difficult. Threat actors are using increasingly creative tactics to deceive potential victims, even developers who have a strong understanding of cybersecurity risks — particularly those working in the blockchain development field.

    As we expect adversaries to continue targeting developers, it is recommended that even experienced IT professionals deploy dedicated security solutions to safeguard sensitive data and prevent financial losses,” commented Georgy Kucherin, Security Researcher with Kaspersky’s Global Research and Analysis Team.

    The threat actor behind the attack published not only malicious Solidity extensions but also another NPM package, solsafe, which also downloads ScreenConnect. A few months earlier, three additional malicious Visual Studio Code extensions were released — solaibot, among-eth, and blankebesxstnion — all of them have already been removed from the repository.

    Spread the love
    Click to comment

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    ad

    You May Also Like

    Tech

    Nigerian Communications Commission (NCC) has welcomed the appointment of Mr. Idris Olorunnimbe as Chairman-designate of its Board, alongside other newly appointed members of the...

    Tech

    Nigerian Communications Commission (NCC) has reiterated its commitment to the full operationalisation of President Bola Ahmed Tinubu’s Executive Order on Critical National Information Infrastructure...

    Tech

    By Kehinde Ogundare, Country Head, Zoho Nigeria Business growth should feel energising — not like a daily struggle. When operations begin to scale, the...

    Sports

    National Basketball Association aka NBA has approved the sale of the Boston Celtics to an investment group led by American billionaire businessman, Bill Chisholm,...