Connect with us

Coin Market

Understanding recent credential leaks and the rise of InfoStealer malware

Published

on

Opinion by: Jimmy Su, Binance chief security officer

The threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond. InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s knowledge. This includes passwords, session cookies, crypto wallet details and other valuable personal information.

According to Kaspersky, these malware campaigns leaked over 2 million bank card details last year. And that number is only growing.

Malware-as-a-service

These tools are widely available via the malware-as-a-service model. Cybercriminals can access advanced malware platforms that offer dashboards, technical support and automatic data exfiltration to command-and-control servers for a subscription fee. Once stolen, data is sold on dark web forums, Telegram channels or private marketplaces.

The damage from an InfoStealer infection can go far beyond a single compromised account. Leaked credentials can lead to identity theft, financial fraud and unauthorized access to other services, especially when credentials are reused across platforms.

Recent: Darkweb actors claim to have over 100K of Gemini, Binance user info

Binance’s internal data echoes this trend. In the past few months, we’ve identified a significant uptick in the number of users whose credentials or session data appear to have been compromised by InfoStealer infections. These infections don’t originate from Binance but affect personal devices where credentials are saved in browsers or auto-filled into websites.

Distribution vectors

InfoStealer malware is often distributed via phishing campaigns, malicious ads, trojan software or fake browser extensions. Once on a device, it scans for stored credentials and transmits them to the attacker.

The common distribution vectors include:

Phishing emails with malicious attachments or links.

Fake downloads or software from unofficial app stores.

Game mods and cracked applications are shared via Discord or Telegram.

Malicious browser extensions or add-ons.

Compromised websites that silently install malware (drive-by downloads).

Once active, InfoStealers can extract browser-stored passwords, autofill entries, clipboard data (including crypto wallet addresses) and even session tokens that allow attackers to impersonate users without knowing their login credentials.

What to watch out for 

Some signs that might suggest an InfoStealer infection on your device:

Unusual notifications or extensions appearing in your browser.

Unauthorized login alerts or unusual account activity.

Unexpected changes to security settings or passwords.

Sudden slowdowns in system performance.

A breakdown of InfoStealer malware

Over the past 90 days, Binance has observed several prominent InfoStealer malware variants targeting Windows and macOS users. RedLine, LummaC2, Vidar and AsyncRAT have been particularly prevalent for Windows users. 

RedLine Stealer is known for gathering login credentials and crypto-related information from browsers.

LummaC2 is a rapidly evolving threat with integrated techniques to bypass modern browser protections such as app-bound encryption. It can now steal cookies and crypto wallet details in real time.

Vidar Stealer focuses on exfiltrating data from browsers and local applications, with a notable ability to capture crypto wallet credentials.

AsyncRAT enables attackers to monitor victims remotely by logging keystrokes, capturing screenshots and deploying additional payloads. Recently, cybercriminals have repurposed AsyncRAT for crypto-related attacks, harvesting credentials and system data from compromised Windows machines.

For macOS users, Atomic Stealer has emerged as a significant threat. This stealer can extract infected devices’ credentials, browser data and cryptocurrency wallet information. Distributed via stealer-as-a-service channels, Atomic Stealer exploits native AppleScript for data collection, posing a substantial risk to individual users and organizations using macOS. Other notable variants targeting macOS include Poseidon and Banshee.

At Binance, we respond to these threats by monitoring dark web marketplaces and forums for leaked user data, alerting affected users, initiating password resets, revoking compromised sessions and offering clear guidance on device security and malware removal.

Our infrastructure remains secure, but credential theft from infected personal devices is an external risk we all face. This makes user education and cyber hygiene more critical than ever.

We urge users and the crypto community to be vigilant to prevent these threats by using antivirus and anti-malware tools and running regular scans. Some reputable free tools include Malwarebytes, Bitdefender, Kaspersky, McAfee, Norton, Avast and Windows Defender. For macOS users, consider using the Objective-See suite of anti-malware tools

Lite scans typically don’t work well since most malware self-deletes the first-stage files from the initial infection. Always run a full disk scan to ensure thorough protection.

Here are some practical steps you can take to reduce your exposure to this and many other cybersecurity threats:

Enable two-factor authentication (2FA) using an authenticator app or hardware key.

Avoid saving passwords in your browser. Consider using a dedicated password manager.

Download software and apps only from official sources.

Keep your operating system, browser and all applications up to date.

Periodically review authorized devices in your Binance account and remove unfamiliar entries.

Use withdrawal address whitelisting to limit where funds can be sent.

Avoid using public or unsecured WiFi networks when accessing sensitive accounts.

Use unique credentials for each account and update them regularly.

Follow security updates and best practices from Binance and other trusted sources.

Immediately change passwords, lock accounts and report through official Binance support channels if malware infection is suspected.

The growing prominence of the InfoStealer threat is a reminder of how advanced and widespread cyberattacks have become. While Binance continues to invest heavily in platform security and dark web monitoring, protecting your funds and personal data requires action on both sides.

Stay informed, adopt security habits and maintain clean devices to significantly reduce your exposure to threats like InfoStealer malware.

Opinion by: Jimmy Su, Binance chief security officer.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Coin Market

SIR.trading begs hacker to return $255K or ‘no chance for us to survive’

Published

on

By

The founder of the recently hacked decentralized finance protocol SIR.trading has made an emotional plea to the attacker, asking them to return around 70% of the stolen customer funds otherwise, the protocol will not survive.

“Here is my proposal, keep $100k as a fair share for your critical bug find, and return the remaining,” SIR.trading’s pseudonymous founder “Xatarrer” wrote in a March 31 onchain message to the attacker following the $355,000 hack on March 30.

“We’ll call it even. No legal games, no drama,” they added. 

Xatarrer said that SIR.trading was built on the back of four years of late-night coding and $70,000 from friends and believers without any additional venture capital funding.

“We grew to $400k TVL organically without any advertising. If you keep 100% of the funds, there is no chance for us to survive.”

Xatarrer even praised the hacker for the sophisticated hack, stating that it was “almost beautiful if it wasn’t for all the funds people lost.”

Source: SIR.trading

The hacker hasn’t responded and has already transferred the stolen funds through to Ethereum privacy solution Railgun, according to data from Ethereum block explorer Etherscan.

Xatarrer initially said on March 30 that the SIR.trading team intended to keep the protocol up and running despite the setback. “We’ve already started planning our next steps. Those impacted by the hack will not be forgotten,” it said on March 31.

Hack resulted from feature added to Ethereum’s Dencun upgrade

The hacker targeted a callback function used in the protocol’s “vulnerable contract Vault” which leverages Ethereum’s transient storage feature. 

The hacker managed to replace the real Uniswap pool address used in this callback function with an address under the hacker’s control, allowing them to redirect the funds in the vault to their address by repeatedly calling the callback function until all of the protocol’s total value locked was drained.

The transient storage feature was added to Ethereum in the March 2024 Dencun upgrade as a solution to offer users lower gas fees than gas typically required for regular storage.

Related: DeFi hacks drop 40% in 2024, CeFi breaches surge to $694M — Hacken

SIR.trading’s documentation shows that it was billed as “a new DeFi protocol for safer leverage” to address some of the challenges that often occur in leveraged trading — such as volatility decay and liquidation risks.

It comes as crypto lost to exploits and scams fell to $28.8M in March, blockchain security firm CertiK said in a March 31 X post. Around $4.8 million was subtracted from that figure after hackers involved in the 1inch Resolver incident returned the stolen funds.

Crypto exploits and scams had one of its worst months in February, headlined by the $1.4 billion Bybit hack.

Magazine: Should crypto projects ever negotiate with hackers? Probably

Continue Reading

Coin Market

zkLend hacker claims losing stolen ETH to Tornado Cash phishing site

Published

on

By

The hacker behind the $9.6 million exploit of the decentralized money-lending protocol zkLend in February claims they’ve just fallen victim to a phishing website impersonating Tornado Cash, resulting in the loss of a significant portion of the stolen funds.

In a message sent to zkLend through Etherscan on March 31, the hacker claimed to have lost 2,930 Ether (ETH) from the stolen funds to a phishing website posing as a front-end for Tornado Cash. 

In a series of March 31 transfers, the zkLend thief sent 100 Ether at a time to an address named Tornado.Cash: Router, finishing with three deposits of 10 Ether.

“Hello, I tried to move funds to a Tornado, but I used a phishing website, and all the funds have been lost. I am devastated. I am terribly sorry for all the havoc and losses caused,” the hacker said.

The hacker behind the zkLend exploit claims to have lost most of the funds to a phishing website posing as a front-end for Tornado Cash. Source: Etherscan

“All the 2,930 Eth have been taken by that site owners. I do not have coins. Please redirect your efforts towards those site owners to see if you can recover some of the money,” they added.

zkLend responded to the message by asking the hacker to “Return all the funds left in your wallets” to the zkLend wallet address. However, according to Etherscan, another 25 Ether was then sent to a wallet listed as Chainflip1. 

Earlier, another user warned the exploiter about the error, telling them, “don’t celebrate,” because all the funds were sent to the scam Tornado Cash URL.

“It is so devastating. Everything gone with one wrong website,” the hacker replied.

Another user warned the zkLend exploiter about the mistake, but it was too late. Source: Etherscan

How zkLend was exploited for $9.6 million

zkLend suffered an empty market exploit on Feb. 11 when an attacker used a small deposit and flash loans to inflate the lending accumulator, according to the protocol’s Feb. 14 post-mortem. 

The hacker then repeatedly deposited and withdrew funds, exploiting rounding errors that became significant due to the inflated accumulator. 

The attacker bridged the stolen funds to Ethereum and later failed to launder them through Railgun after protocol policies returned them to the original address. 

Following the exploit, zkLend proposed the hacker could keep 10% of the funds as a bounty and offered to release the culprit from legal liability and scrutiny from law enforcement if the remaining Ether was returned.

Related: DeFi protocol SIR.trading loses entire $355K TVL in ‘worst news’ possible

The offer deadline of Feb. 14 passed with no public response from either party. In a Feb. 19 update to X, zkLend said it was now offering a $500,000 bounty for any verifiable information that could lead to the hacker being arrested and the funds recovered.

Losses to crypto scams, exploits and hacks totaled over $33 million, according to blockchain security firm CertiK, but dropped to $28 million after decentralized exchange aggregator 1inch successfully recovered its stolen funds

Losses to crypto scams, exploits and hacks totaled nearly $1.53 billion in February. The $1.4 billion Feb. 21 attack on Bybit by North Korea’s Lazarus Group made up the lion’s share and took the title for largest crypto hack ever, doubling the $650 million Ronin bridge hack in March 2022. 

Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis

Continue Reading

Coin Market

Coinbase CEO calls for change in stablecoin laws to enable ‘onchain interest’

Published

on

By

Coinbase CEO Brian Armstrong is calling for legislative changes in the US to allow stablecoin holders to earn “onchain interest” on their holdings.

In a March 31 post on X, Armstrong argued that crypto companies should be treated similarly to banks and be “allowed to, and incentivized to, share interest with consumers.” He added that allowing onchain interest would be “consistent with a free market approach.”

Source: Brian Armstrong

There are currently two competing pieces of federal stablecoin legislation working their way through the legislative process in the US: the Stablecoin Transparency and Accountability for a Better Ledger Economy (STABLE) Act, and the Guiding and Establishing National Innovation for US Stablecoins (GENIUS) Act.

In reference to the stablecoin legislation, Armstrong said the US had an opportunity to “level the playing field and ensure these laws pave a way for all regulated stablecoins to deliver interest directly to consumers, the same way a savings or checking account can.” 

Armstrong: Onchain interest a boon for US economy

Armstrong argued that while stablecoins have already found product-market fit by “digitizing the dollar and other fiat currencies,” the addition of onchain interest would allow “the average person, and the US economy, to reap the full benefits.”

He said that if legislative changes allowed stablecoin issuers to pay interest to holders, US consumers could earn a yield of around 4% on their holdings, far outstripping the 2024 average interest yield on a consumer savings account, which Armstrong cited as 0.41%.

Armstrong also said onchain interest could benefit the broader US economy — by incentivizing the global use of US dollar stablecoins. This could see their use grow, “pulling dollars back to U.S. treasuries and extending dollar dominance in an increasingly digital global economy,” according to the Coinbase CEO. 

He also argued that the potential for a higher yield than traditional savings accounts would result in “more yield in consumers’ hands means more spending, saving, investing — fueling economic growth in all local economies where stablecoins are held.”

“If we don’t unlock onchain interest, the U.S. misses out on billions more USD users and trillions in potential cash flows,” Armstrong added.

Currently, neither the STABLE Act nor the GENIUS Act gives the legal go-ahead for onchain interest-generating stablecoins. In fact, in its current form, the STABLE Act includes a short passage prohibiting “payment stablecoin” issuers from paying yield to holders:

Source: STABLE Act

Related: Stablecoins, tokenized assets gain as Trump tariffs loom

Similarly, the GENIUS Act, which recently passed the Senate Banking Committee by a vote of 18-6, has been amended to exclude interest-bearing instruments from its definition of a “payment stablecoin.”

Commenting on the current state of the STABLE Act, Representative Bryan Steil told Eleanor Terrett, host of the Crypto in America podcast, that two pieces of legislation are positioned to “mirror up” following a few more draft rounds in the House and Senate — due to the differences between them being textual rather than substantive.

“At the end of the day, I think there’s recognition that we want to work with our Senate colleagues to get this across the line,” Steil said.

Magazine: SEC’s U-turn on crypto leaves key questions unanswered

Continue Reading

Trending