Malware Campaign Steals Cryptocurrency Using Satacom Downloader and Rogue Chromium Extension

Malware Campaign Steals Cryptocurrency Using Satacom Downloader and Rogue Chromium Extension

Malware Campaign Steals Cryptocurrency Using Satacom Downloader

Introduction

A new malware campaign has been discovered that uses Satacom downloader to deploy malware and steal cryptocurrency. The purpose of this malware is to steal BTC from the victim’s account by performing web injections into targeted cryptocurrency websites.

Satacom downloader

The malware campaign relies on a Satacom downloader as a conduit to deploy the malware. The Satacom downloader is a malware that downloads and installs additional malware on the victim’s computer.

Cryptocurrency Theft

The primary goal of the malware is to steal virtual currency from the victim’s account by performing web injections into targeted cryptocurrency websites. Once the malware is installed, it injects code into the browser when the victim visits a cryptocurrency site, intercepting the login credentials and stealing the virtual currency stored in the victim’s account.

Rogue Extension for Chromium-Based Browsers

According to the Kaspersky report, the malware uses a rogue extension for Chromium-based browsers to carry out its malicious activities. The extension runs in the background and is designed to obfuscate the malware’s actions from the user.

Summary

In summary, a new malware campaign has been discovered that utilizes Satacom downloader to deploy malware and steal cryptocurrency. The malware’s primary goal is to steal virtual currency from the victim’s account by performing web injections into targeted cryptocurrency websites. Users should exercise caution when visiting cryptocurrency sites and use up-to-date anti-malware software to protect their devices.Original Article: https://thehackernews.com/2023/06/new-malware-campaign-leveraging-satacom.html

Leave a Reply

Your email address will not be published. Required fields are marked *

0

Your Cart Is Empty

No products in the cart.