The post North Korean Malware Hits Ethereum and BSC Wallets: Details appeared on BitcoinEthereumNews.com. According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package. The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask.  Modus operandi  A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers. Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers.  Immediate actions Those who think that they were exposed to the attack should assume that their hot wallets were compromised.  Attackers typically steal extension files and passwords together with seed phrases to drain wallets.  One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked.  It would also be advisable to wipe and reinstall the operating system, given that such malware  In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs. $2 billion worth of stolen crypto  Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year. The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion.  Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-detailsThe post North Korean Malware Hits Ethereum and BSC Wallets: Details appeared on BitcoinEthereumNews.com. According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package. The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask.  Modus operandi  A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers. Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers.  Immediate actions Those who think that they were exposed to the attack should assume that their hot wallets were compromised.  Attackers typically steal extension files and passwords together with seed phrases to drain wallets.  One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked.  It would also be advisable to wipe and reinstall the operating system, given that such malware  In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs. $2 billion worth of stolen crypto  Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year. The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion.  Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-details

North Korean Malware Hits Ethereum and BSC Wallets: Details

2025/10/19 17:05

According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package.

The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask. 

Modus operandi 

A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers.

Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers. 

Immediate actions

Those who think that they were exposed to the attack should assume that their hot wallets were compromised. 

Attackers typically steal extension files and passwords together with seed phrases to drain wallets. 

One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked. 

It would also be advisable to wipe and reinstall the operating system, given that such malware 

In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs.

$2 billion worth of stolen crypto 

Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year.

The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion. 

Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-details

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like