Scan to download
BTC $75,118.84 +0.64%
ETH $2,340.85 +0.05%
BNB $628.67 +1.04%
XRP $1.44 +2.41%
SOL $88.43 +3.84%
TRX $0.3246 -0.39%
DOGE $0.0981 +1.97%
ADA $0.2567 +2.67%
BCH $449.90 +2.05%
LINK $9.49 +2.01%
HYPE $43.83 -3.19%
AAVE $114.12 +6.98%
SUI $0.9933 +1.65%
XLM $0.1671 +3.50%
ZEC $335.24 -1.40%
BTC $75,118.84 +0.64%
ETH $2,340.85 +0.05%
BNB $628.67 +1.04%
XRP $1.44 +2.41%
SOL $88.43 +3.84%
TRX $0.3246 -0.39%
DOGE $0.0981 +1.97%
ADA $0.2567 +2.67%
BCH $449.90 +2.05%
LINK $9.49 +2.01%
HYPE $43.83 -3.19%
AAVE $114.12 +6.98%
SUI $0.9933 +1.65%
XLM $0.1671 +3.50%
ZEC $335.24 -1.40%

jack

Two teenagers in France were arrested for hijacking a cryptocurrency figure with explosives, and the police deployed helicopters for the pursuit

According to DL News, police in the Île-de-France region of France arrested two teenagers (aged 15 and 17) and a 35-year-old man, all suspected of carrying out two armed kidnappings targeting cryptocurrency holders on March 10 in the Île-de-France region.Reports indicate that the first incident occurred in the Essonne department in the southern suburbs of Paris, where the suspects, wearing masks and carrying small explosive devices, attempted to break into the home of a cryptocurrency holder but failed. About 30 minutes later, another incident took place in the Seine-et-Marne department, where the suspects successfully broke into the home of a female cryptocurrency holder, kidnapped her family, and stole jewelry; it has not been disclosed whether cryptocurrency assets were also stolen.The police subsequently tracked the suspects' vehicle, deploying about 100 armed special police officers and two police helicopters to pursue them, intercepting the vehicle after approximately 6 hours and discovering the stolen jewelry inside. Prosecutors have charged the three individuals with extortion, organized crime, armed robbery, property damage, and kidnapping. Currently, the 17-year-old suspect and the 35-year-old man are in custody awaiting trial, while the 15-year-old suspect is under judicial supervision, and prosecutors have appealed this decision.

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.

Hackers impersonate VC and hijack the QuickLens plugin, using ClickFix technology to steal cryptocurrency assets

According to Cointelegraph, hackers are using the "ClickFix" attack method to steal cryptocurrencies, with the latest two attacks involving impersonating venture capital firms and hijacking browser extensions.Cybersecurity company Moonlock Lab reports that scammers impersonate fake VCs such as SolidBit, MegaBit, and Lumax Capital, contacting users via LinkedIn to offer collaboration opportunities, then directing them to click on fake Zoom and Google Meet links. After clicking the link, users are led to a page with a forged Cloudflare "I'm not a robot" verification box; clicking this box copies malicious commands to the clipboard and prompts users to open a terminal to paste the so-called verification code, thus executing the attack.Moonlock Lab points out that this method turns victims into execution mechanisms, bypassing defenses in the security industry. Meanwhile, hackers are also spreading malware by hijacking the Chrome extension QuickLens. This extension allows users to run Google Lens searches directly in the browser, and after ownership was transferred, the new version contains malicious scripts that can initiate ClickFix attacks and steal information.The extension has about 7,000 users, and once hijacked, it searches for cryptocurrency wallet data and recovery phrases to steal funds, as well as scraping Gmail inbox content, YouTube channel data, and login credentials or payment information entered in web forms. The extension has been removed from the Chrome Web Store. The ClickFix technique has been popular among hackers since last year, forcing victims to manually execute malicious payloads, affecting thousands of businesses and multiple industries worldwide.
app_icon
ChainCatcher Building the Web3 world with innovations.