Ethereum has become the latest front for software supply chain attacks. Researchers at ReversingLabs earlier this week uncovered two malicious NPM packages …
Malware
-
-
In short Hackers use fake -capshas to distribute Lumma Stealer malware, has found new research. Once installed by an unsuspecting user, the …
-
Web3
APWG Q1 Report: Rising Waves of QR-Code Attacks Driving Users to Phishing and Malware Websites
by shayaanby shayaanWire-transfer BEC attacks increased by 33 percent compared from Q4 to Q1 2025 CAMBRIDGE, MASSACHUSETTS / ACCESS Newswire / July 2, 2025 …
-
Markets
North Korean Hackers Are Targeting Top Crypto Firms With Malware Hidden in Job Applications
by shayaanby shayaanA North Korean hacking group is targeting crypto workers with a Python-based malware disguised as part of a fake job application process, …
-
Welcome to The Protocol, CoinDesk’s weekly wrap-up of the most important stories in cryptocurrency tech development. I’m Margaux Nijkerk, the Ethereum protocol …
-
Malware operations targeting holders of Ethereum, XRP, and Solana cryptocurrencies have been exposed by cybersecurity researchers. The threat attacks Atomic and Exodus …
-
Smart Contracts
Malware in Cracked TradingView App Has Been Draining Crypto Wallets
by shayaanby shayaanScammers use cracked versions of TradingView Premium to remove crypto portfolios. The app is disguised as a “cracked” version of the real …
-
Markets
Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets
by shayaanby shayaanTech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the …
-
Criminals are blackmailing YouTube creators into adding malicious crypto-mining malware to their videos, according to research from cybersecurity firm Kaspersky. The hackers …
-
Scams
Crypto-Stealing Malware Spread Through Fake GitHub Repositories, Kaspersky Warns
by shayaanby shayaanHackers are targeting software developers by spreading malware through fake GitHub repositories, according to new research. A lot of code on the …