🔥最近RedLine黑客更新了产品视频,我们来看下他们的攻击手法、常用工具等:1/🧵
🔥The RedLine hackers have recently updated their product videos, so let's take a look at their attack techniques, common tools and more: 1/🧵 @SlowMist_Team@evilcos@wallet_guard
@SlowMist_Team@evilcos@wallet_guard 2/🧵首先他们是Saas服务,Bot恶意机器人的模式,通过下图这样的方式来传播、钓鱼虚拟货币用户:
Firstly they are Saas services, Bot malicious bots in the mode of spreading, phishing virtual currency users by means such as the following.
@SlowMist_Team@evilcos@wallet_guard 3/🧵 教使用者如何通过社交网络、邮件钓鱼,使用什么在线工具绕过杀毒软件查杀、做SEO、投放诱饵
3/🧵 Teach users how to phish through social networks, emails, and what online tools to use to bypass anti-virus software、Doing SEO, placing bait
@SlowMist_Team@evilcos@wallet_guard 4/🧵攻击者是典型俄语使用者,视频用使用俄语、英语双语,电脑操作系统都是俄语。( 图:发送钓鱼邮件)
The attacker is a typical Russian speaker, the video is bilingual in Russian and English and the computer operating system is all in Russian
@SlowMist_Team@evilcos@wallet_guard 5/🧵各种专业的钓鱼、盗窃工具展示、使用,窃取虚拟货币。
Various professional fishing and theft tools on display and in use,Stealing virtual currency.
@SlowMist_Team@evilcos@wallet_guard 6/🧵专业盗窃木马,用户中招木马,木马就扫描本地电脑钱包、密码、私钥等上传到恶意服务器。
Professional theft Trojan, the user is hit by the Trojan and the Trojan scans the local computer for wallets, passwords, private keys, etc. and uploads them to a malicious server.
@SlowMist_Team@evilcos@wallet_guard 7/🧵演示密码、浏览器、加密货币钱包盗窃方式,可以看到使用的hashcat等专业黑客工具
Demonstration of password, browser, and cryptocurrency wallet theft, with the use of professional hacking tools such as hashcat visible
9/🧵而且远不止,包括最火的NFT,他们都有全套诈骗教程:伪造艺术家信息-伪造推特账号-发布作品-诈骗完成。And far more, including the hottest NFT, who have a full tutorial on scams: fake artist info - fake Twitter account - post work - scam complete.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Through analysis, I think the kyberswap may not be the attack caused by GMT. Google GMT is a service provided by Google, which is relatively safe, so it is more likely that someone has changed the front-end code of kyberswap or kyberswap has been hijacked.@Foresight_News@evilcos
@Foresight_News@evilcos@sniko_
The way to use GMT code is very simple. It just assigns an ID to the user, and the user embeds it in his own front-end code for statistics.
@Foresight_News@evilcos@sniko_ Now the kyberswap GMT code seems to be still there, so could the problem with this attack be GMT?
👀Everyone is talking about web3.0, but all ignore the fragility of web3.0:
‼️Let me briefly list the common attack risk points, please read the following list carefully, it is very important: @SlowMist_Team@0xfoobar@officer_cia@sniko_@Mudit__Gupta
@SlowMist_Team@0xfoobar@officer_cia@sniko_@Mudit__Gupta 1/web3 still needs a domain name, which is the entrance to the Internet. And the domain name needs to be registered with the domain name service provider, there is a risk here: the domain name service provider may be attacked by social engineering