Listen to this blog post below
With cryptocurrencies soaring in value and popularity, crypto wallets have been a lucrative target of malicious actors. The new “DoubleFinger” threat that targets cryptocurrency wallets has prompted security experts to remain on high alert.
A leading cybersecurity organization recently unveiled the emergence of a new and highly sophisticated malware called “DoubleFinger” that targets cryptocurrency wallets.
The DoubleFinger malware deploys a unique multi-stage attack mechanism resembling an advanced persistent threat (APT). The malicious operation starts with sending an email attachment that contains a PIF file. Potential victims trigger a chain of detrimental events upon accessing the file.
While analyzing the nature of the multi-stage attack, cybersecurity experts have highlighted the exceptional proficiency of the cryptocurrency stealer group. This group developed the DoubleFinger loader and GreetingGhoul malware, which marks the growing sophistication of cyberattacks.
How Does the DoubleFinger Cyberattack Work?
In the initial stage, the DoubleFinger malware downloads encrypted components from the popular image-sharing platform Imgur. The malware is advanced enough to disguise itself as a PNG file. These components consist of a loader for the subsequent stage. It includes a legitimate java.exe file and another PNG file for the following stages.
Then DoubleFinger successfully executes its loader, evading security software with agility. It subsequently commences the further stages of the malicious attack. The DoubleFinger malware, in the fourth stage, uses the Doppelgänging technique to replace a legitimate process with a modified one, which contains the payload for the fifth stage. The approach seems advanced enough and has been designed to bypass security measures.
Finally, it installs the GreetingGhoul crypto stealer in the wallet. The miscreants program it to run daily, stealing information from the wallets. Technical analysis carried out by cybersecurity experts reveals two critical components in GreetingGhoul.
The first component is used to identify crypto-wallet applications within the system. It steals valuable data like seed phrases and private keys. The next segment covers the interface of cryptocurrency apps and thereby intercepts user inputs. Thus, it grants control over funds to the cryptocurrency stealers and allows them to withdraw the same from the wallet.
Malicious actors have also revealed that some variants of the DoubleFinger malware can install the remote access Trojan Remcos in the system. That grants online adversaries complete control of the affected wallets.
How Can Investors Secure Their Crypto Wallets?
Cybersecurity experts recommend several proactive measures to secure the crypto wallets of investors. They include diversifying wallet usage, maintaining vigilance against potential scams, and staying up-to-date about cold wallet vulnerabilities. Moreover, they recommend crypto investors acquire their hardware wallets only from official sources.
Image sourced from cryptopotato.com
Here’s a look at these measures in detail.
- Purchase hardware from official sources: Cybersecurity experts recommend crypto investors purchase their hardware from official and trusted sources. Sticking to reputable vendors like authorized resellers or, preferably, the manufacturer’s website is wise. Remember, hardware wallet providers don’t require you to enter your recovery seed into the system.
- Check for signs of tampering: Carefully examine a new hardware wallet before using it. It might have signs of tampering, glue residue, scratches, or mismatched components. All these are signs of a compromised device. Make sure to use secure hardware wallets without any of these signs.
- Verify the firmware: Always validate the legitimacy and currency of the firmware installed on your hardware wallet. You will find the latest version of the wallet on the manufacturer’s website. Make sure to run an updated and genuine firmware.
- Secure your seed phrase: While setting up your hardware wallet, record and securely store the seed phrase accurately. It is a critical piece of information that serves as a backup to restore your wallet in case of loss or theft. Cybersecurity experts recommend using a reliable security solution to secure the crypto details stored on your PC or mobile device.
- Use a strong password: It’s wise to create a strong and unique password if your hardware wallet supports password protection. Refrain from using generic or easily guessable passwords. Neither should you reuse passwords from other accounts. By using a strong password, you can bolster the security of your digital wallets.
Cybersecurity news involving compromised crypto wallets has been frequent in recent years. Recently, two Russian nationals were accused of stealing millions from Mt Gox, a crypto exchange that is currently dysfunctional.
Securing crypto wallets requires collective responsibility among individuals, wallet providers, and the broader cryptocurrency community. The DoubleFinger discovery by cybersecurity experts serves as a vital reminder regarding the various pressing threats for crypto investors.
By remaining vigilant and having proper phishing protection measures, investors can draw their line of defense against these risks. This way, they can secure their digital assets from unauthorized access and theft.