[ccpw id="5"]

front pageToday's NewsA Chrome extension discovered that steals crypto wallet private keys

A Chrome extension discovered that steals crypto wallet private keys

-

Recently, a Google Chrome extension was found to inject malicious JavaScript code into web pages. This code allowed the extension to steal various passwords and private keys of users' Bitcoin wallets and cryptocurrency portals.

The extension, which has a rather indecent name, is called “Shitcoin Wallet” and has an extension ID of “ckkgmccefffnbbalkmbbgebbojjogffn.” The extension was launched on December 9 last year.

In a blog post introducing the extension, the team described Shitcoin Wallet as a wallet that allows users to buy Ethereum and manage it properly. In addition, Shitcoin Wallet also supports ERC20-based tokens, which are usually distributed through initial coin offerings (ICOs).

If this Google Chrome extension was harmless, it would serve an important purpose. Users can install the extension and manage Ethereum and its ERC-20 tokens in their browser. In addition, if users want to manage their funds outside the high-risk environment of the browser, they can also install a Windows desktop application.

However, things started to go wrong and Harry Denley became the cause of the incident. Denley was the security director of the MyCrypto platform and he found malicious code inside the extension. It seems that nothing can exist only for the benefit of all mankind.

Denley explained that the extension presents two significant dangers. First, any funds managed directly within the extension are at risk. This is because the extension sends the private keys of any wallets managed or created within its interface to a third-party website located at the address “erc20wallet[.]tk.”

The second key issue is that when users visit five well-known cryptocurrency management platforms, the extension actively injects JavaScript code. By injecting malicious code, the extension steals the private keys and login details of these platforms and sends them to the same third-party website.

A detailed analysis of the code revealed that the entire process is divided into multiple steps. First, the user installs the extension, which then requests permission to inject more JavaScript code on 77 websites. When the user visits one of these 77 websites, the extension loads and injects another JavaScript file from "https://erc20wallet[.]tk/js/content_.js". This file contains obfuscated code and is activated on the following five websites:
MyEtherWallet.com,
Idex.Market,
Binance.org,
NeoTracker.io and
Switcheo.exchange. The code then records the private key and login information created by the user and sends it to a third-party website.

Please join our Telegram channel to get the latest news coverage.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Information Recommendation

El Salvador’s continued embrace of Bitcoin under President Bukele’s re-election

El Salvador's President Nayib Bukele has begun his second presidential term with an agenda centered on adopting Bitcoin to revive the country's economy. His approach includes promoting international relations and dealing with expected obstacles. Nayib Bukele, 42, celebrated the start of his second presidential term, winning...

MANTA Network Price Prediction: Experts Say This Booming ICO Could Be The Best Crypto To Buy Right Now, MANTA Plummets 15%

Join Our Telegram channel to stay up to date on breaking news coverage The Manta Network price plunge...

UAE Ministry of Health to migrate health information storage to blockchain

区块链技术正在全球的多个重要行业中稳步渗透。随着加密货币成为越来越具吸引力的投资和汇款选择,这项父技术也在医疗领域崭露头角。 2月2日,阿联酋新闻社报道,阿联酋卫生与预防部(MoHAP)以及迪拜医疗...

Today, the hottest cryptocurrency on the Ethereum chain, Brightcoin, is packaged with a super tensor

【新闻翻译】 【加入我们的Telegram频道以获取最新的新闻报道】 Meme币在本轮牛市中仍然保持着最佳表现的地位,每天都有数个新币加入市场。尽管该行业的高波动性,但投资者对其的兴趣仍然相对较高。...

Follow us

0FansLike
3,888FollowersFollow
0SubscribersSubscribe

Latest News

en_GBEnglish