More Than 100 Flavors Of Malware Are Stealing Bitcoins

  /     /     /  
Publicated : 22/11/2024   Category : security


More Than 100 Flavors Of Malware Are Stealing Bitcoins


Specialized form of malware empties electronic wallets of digital currency, and antivirus often misses it



RSA CONFERENCE 2014 -- San Francisco -- For just $35, you can buy a popular, specialized malware tool that steals Bitcoins and other such electronic currency -- and researchers have unearthed more than 100 different malware families that specialize in this form of theft.
Dell SecureWorks researchers Joe Stewart and Pat Litke discovered 80 of those cryptocurrency-stealing malware families in just the past year as thieves clamor to cash in on the growing use of digital currency. Some of the malware variants are custom, while others are cranked out via malware-generator tools, but, either way, the average rate of detection across all antivirus tools is just below 50 percent, the researchers said here this week.
[Bitcoins and digital currency] are very easy to steal, says Joe Stewart, director of malware research for SecureWorks. While some sophisticated hackers are stealing the currency, many of the thieves are novice script kiddies who get the cheap tools to snatch the currency from unsuspecting victims.
In my opinion, most of them are individual actors. I dont know if youd want a group of people doing it due to the challenge of splitting the ruins, he says. Theres definitely big overhead in trying to launder money from credit cards and bank accounts, but theres [no overhead] in Bitcoins, so theres no risk, he says. And theres been no single case of law enforcement with someone who stole a Bitcoin.
If banks eventually adopt Bitcoin, then law enforcement would be motivated to pursue investigations into cryptocurrency theft. These thefts are happening around the glob, according to SecureWorks, including in the U.S. and Europe.
Bitcoins and other forms of cryptocurrency are getting pilfered via wallet-stealing malware and credential-stealing malware, as well as via man-in-the browser attacks and phony currency with embedded wallet-stealing malware, Stewart and Litke found.
PredatorPain is the most pervasive flavor of this malware. Its a credential- and file-stealing Trojan that was first released in 2009, and goes for about $35 in the hacker underground. Another malware family called SovietMiner steals wallet files and forces the victims machine to mine alternative coins for the bad guys profit. This malware goes for about $15 per month.
Stewart says its difficult to get a handle on the total losses being suffered by cryptocurrency owners, but he saw one case this week where the victim lost to thieves 127 Bitcoins valued at $540 apiece. They were hacked not through malware, but a vulnerability in a third-party search engine, Stewart says.
Its difficult to assess total losses because users are their own banks with cryptocurrency, he says. Every day I go into these forums, someone got robbed. Their wallet was emptied and they dont know what happened. They had the latest antivirus updates, but it still didnt matter, he says.
Wallet-stealing malware is the most popular form of this crimeware, which searches for wallet.dat or other known wallet software key storage files. Once that file is found, the wallet gets uploaded to a remote FTP, Web, or SMTP server where the thief extracts the keys and grabs the coins, signing a transaction that transfers them to his account.
Credential-stealing malware go after the Bitcoin users Bitcoin exchange credentials. Many exchanges have implemented two-factor authentication using one-time PINs to combat unauthorized logins, Stewart and Litke wrote in a report released today on their findings. However, more advanced malware can easily bypass OTP-based 2FA, by intercepting the OTP as it is used and creating a second hidden browser window in order to log the thief into the account from the users own computer.
Man-in-the browser malware intercepts the transaction and changes the recipient address before its signed. The malware waits for new content hitting the clipboard: If it contains a valid Bitcoin address, the malware injects its own address to get the coins.
The bottom line is that Bitcoins are a risky business. A lot of people using Bitcoins dont understand what they are doing with them, Stewart says. And if a Bitcoin is stolen, you dont get it back. Theres no bank to back you, no insurance. Our goal with this paper is to get it out there how bit this threat has become ... [people] just have to get better security practices in storing Bitcoin wallets.
There are some ways to protect this digital currency, such as alternative wallets, like Armory and Electrum, that split up key storage. An offline computer stores the private key for signing transactions, while another machine connected to the Internet holds the master key.
Hardware wallets, meanwhile, operate in a key fob style, and transaction integrity verification is an emerging option.
The full report by SecureWorks is available
here
for download.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
More Than 100 Flavors Of Malware Are Stealing Bitcoins