🔍 High Level:
- Primarily an info stealer
- Targets cold/hot wallets
- Steals discord tokens
- Steals from over 17 different extensions 👇
2/ Why should you care?
“The malware, which the author claims to have developed in just six hours, is quite stealthy, with VirusTotal returning a detection rate of around 22%.” - Bleeping Computer
The entire code-base for this malware was released for free. 👇
3/ What makes this malware interesting?
🔍 Uses Discord web-hooks OR Telegram bots to communicate back to attacker
🔍 Written in Rust which allows for easy porting to macOS or Linux
🔍 Can modify clipboard to attempt to steal crypto by replacing the copied address with theirs.
4/ Why should Web3 Care?
🔲 This malware targets your hot/cold wallets.
🔲 Could replace copied addresses on clipboard
🔲 Easy to impact Windows, macOS and Linux
🔲 Low Detection Rate
5/ What can I do to protect myself?
🔲 Download @Malwarebytes and get premium
🔲 Never download random files
🔲 Always open documents via Google Docs or something similar
🔲 Check the copied address every-time before sending any transactions.
A severe 0-day vulnerability called #Follina has been exposed (since May 27th) in MS Word Documents.
It could allow hackers to take full control of your computer, in some cases WITHOUT even opening the file. 🧵
1/ This exploit is a mountain of exploits stacked on top of eachother. However, it is unfortunately easy to re-create and cannot be detected by anti-virus. Strap in as we try to explain.
2/ The 0-day starts with a feature in MS Word called Templates.
This feature allows Word to load and execute HTML and JS from external sources.
A brief intro to wallet security (from beginner to advanced)
(1/19) 🧵
2) Let’s start with the basics. Your private key is for you and you only.
Many scammers will host fake giveaways, phishing sites, malicious code and more to try and steal this from you.
(2/19)
Practicing perfect security practices all the time is difficult. Even just doing half of these habits consistently will improve your wallet security 10x. 👇