The Russian gang targets encryption holders with harmful programs to manufacture spears across the pulp.

A Russian electronic crime gang called "Crazy Evil" is behind a new rash of social media fraud targeting encryption users.

The gang was identified in new threats to cybersecurity a report As brains behind more than 10 fraud for advanced social media that tempt victims to download Harmful programs To steal their encryption. Fraud operations are said to benefit from a detailed social engineering tactics to persuade users to drop their caution and install harmful programs such as Angel Drainer, Atomic Mac OS Stealer and Stealc.

The Russian gang targets encryption holders with harmful programs to manufacture spears across Toura-1
Crazy cyber threat analysis source: Insighting Group

Provide an insight into the internal work of Crazy Evil, the threat research group, which made this discovery, in a file advertisement:

The Crazy Evil process is both wide and accurate. Six SUBTEAMS - Availa, Colted, Deland, Zoomland, Defi, and Kevland - custom frauds targeting specific victims profiles. From the cookic magic that aims to the effects of cryptocurrency to the loads of harmful programs designed for infection across platforms, the group's tactics reflect an advanced understanding of cybersecurity.

According to Insikt, the Crazy Evil capabilities extend through both Windows and Mac OS, which gives it a platform feature in bargaining users, which this gang is uniquely dangerous. Insikt also revealed that in addition to its ability to advanced social engineering and its capabilities via platforms, what represents Crazy Evil is his explicit targeting of encryption owners with malware specifically designed to steal the portfolio keys and extract other information that can be used.

To alleviate the development of crazy evil malicious software attacks, users are encouraged to spread the discovery solutions and end points that you examine effectively due to the presence of specific harmful programs related to the gang, in addition to the web monitoring and liquidation to prevent access to the malicious areas that it controls through the insane evil.

On December 28, the investigator of the series Taylor Manhan A mark has been placed The presence of similar bad actors that used social engineering tactics such as fake functional interviews Web3 to install harmful programs on the victims' devices in order to steal the encryption wallet keys in the end.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *