Scan to download
BTC $79,541.87 -1.15%
ETH $2,259.92 -0.71%
BNB $671.35 +2.24%
XRP $1.43 -0.19%
SOL $90.93 -3.77%
TRX $0.3502 +0.55%
DOGE $0.1137 +4.24%
ADA $0.2646 -2.09%
BCH $433.69 -1.05%
LINK $10.21 -0.30%
HYPE $39.20 -2.42%
AAVE $96.03 +0.27%
SUI $1.22 -1.22%
XLM $0.1598 -1.55%
ZEC $537.94 -2.12%
BTC $79,541.87 -1.15%
ETH $2,259.92 -0.71%
BNB $671.35 +2.24%
XRP $1.43 -0.19%
SOL $90.93 -3.77%
TRX $0.3502 +0.55%
DOGE $0.1137 +4.24%
ADA $0.2646 -2.09%
BCH $433.69 -1.05%
LINK $10.21 -0.30%
HYPE $39.20 -2.42%
AAVE $96.03 +0.27%
SUI $1.22 -1.22%
XLM $0.1598 -1.55%
ZEC $537.94 -2.12%

extension

Slow Fog: TRON users should be vigilant against phishing activities involving counterfeit TronLink Chrome extensions

SlowMist has issued a security warning stating that a high-risk phishing activity targeting TRON wallet users has been discovered. Attackers created a fake Chrome extension for the TronLink wallet, using Unicode bidirectional control characters and Cyrillic homographs to disguise the brand name. After installation, the extension loads a complete phishing page through a remote iframe, forming a "shell-core separation" credential theft chain.The malicious extension name uses homographs for disguise, and its Chrome Store page inherits the high user count and positive reviews of the real extension, lowering the review threshold. There is very little local code, only loading remote pages, making static analysis nearly impossible to detect malicious behavior. The remote phishing page perfectly replicates the official TronLink web wallet interface, stealing mnemonic phrases, private keys, Keystore files, and passwords, and relaying them in real-time via a Telegram Bot.Built-in anti-analysis features disable right-click, developer tools, drag-and-drop, and printing, and redirect based on the geographic and language settings of Russian users to evade detection. SlowMist recommends immediately uninstalling suspicious extensions, clearing local storage, checking for abnormal traffic, and if credentials have been entered, creating a new wallet and transferring assets immediately.

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.
app_icon
ChainCatcher Building the Web3 world with innovations.