A malware campaign specifically targeting the crypto and NFT communities on Discord has been discovered, according to a report by Bleeping Computer.
Malicious actors abuse the popular charting service with the help of an algorithm called Babadeda, which means “grandma-grandpa” in Russian.
Cybersecurity firm Morphisec was the first to spot the new malware distribution campaign earlier this week.
Criminals often try to trick users into downloading fake software that copies popular blockchain games like Mines of Dalarna.
Source: blog.morphisec.co
Using the HTML object from one of the decoy websites, Morphisec determined that the malware campaign was being run by people from a Russian-speaking country.
They mimic the websites of some of the most famous companies in the NFT industry, including OpenSea and Larva Labs.
People who start installing malware often see a fake bug used as a deception technique while the installer does its job in the background.
It is no surprise that Discord has become a target of malicious actors as it has become a home for many crypto users where they can communicate through public or private channels.
Earlier this month, Discord put plans to integrate the Ethereum network on hold after facing backlash from the anti-crypto segment of its customer base.
Join Bitcoin Magazine Telegram to keep track of news and comment on this article: https://t.me/coincunews
Follow the Youtube Channel | Subscribe to telegram channel | Follow the Facebook page
Bitcoin Spot ETF Inflows have reached $510 million as of November 13, marking six consecutive…
Solana DEX trading volume reached historic highs, exceeding $5 billion daily for three days. Raydium…
Phantom iOS users are warned that a recent app update caused some users to log…
Japanese crypto exchange Coincheck is set to become the first Japanese crypto exchange to list…
The US DOJ investigates Polymarket for Alleged Illegal US User Bets Polymarket, for allegedly permitting…
Ethereum’s ICO was priced at around $0.30 per token, and today, it’s valued in the…
This website uses cookies.