The crypto-clipping malware referred to as Styx Stealer targets Windows operating systems.
2024-08-19 12:37:02
In April, cybersecurity company Check Point Research identified Styx as a more robust variant of Phemodrone Stealer
In April, cybersecurity company Check Point Research identified Styx as a more robust variant of Phemodrone Stealer.
This malware took advantage of a Windows vulnerability that has since been patched, allowing it to intercept cryptocurrency transactions and extract sensitive information from affected systems, including private keys, browser cookies, and autofill data.
In early 2024, Phemodrone attracted attention for its ability to target web browsers, extracting cryptocurrency from wallets and collecting other sensitive data.
Both Phemodrone and Styx Stealer take advantage of a vulnerability in Windows Defender, the operating system's built-in antivirus, by exploiting an outdated flaw in the SmartScreen feature, which is designed to warn users about potentially harmful websites and downloads.
Styx, however, poses even greater risks due to its crypto-clipping capability. This feature enables the malware to monitor clipboard activity and replace copied cryptocurrency wallet addresses with those belonging to the attacker.
Styx employs essential anti-analysis techniques to hide its operations. To evade detection, it terminates processes associated with debugging tools and recognizes virtual machine environments. When it identifies such an environment, Styx Stealer initiates a self-deletion sequence.
Accessible via Telegram
The distribution and sale of the malware are conducted manually through the Telegram account @styxencode and the website styxcrypter[.]com. CPR has also identified advertisements and YouTube videos promoting this malicious software.
At least 54 individuals have sent the Styx developer around $9,500 in various cryptocurrencies, including Bitcoin and Litecoin. In contrast to its predecessor, which was offered for free, this malware is available for a monthly fee of $75, $230 for three months, and $350 for lifetime access.
The total amount of cryptocurrency stolen or the extent of systems compromised by Styx remains uncertain.
Earlier this year, antivirus company Kaspersky reported the discovery of crypto-stealing malware on Apple’s MacOS. This malware specifically targeted Bitcoin and Exodus wallets by substituting the legitimate software with a modified version.
As the cryptocurrency sector continues to grow, hacks and thefts have proven to be highly lucrative, resulting in millions of dollars lost each year. However, some notorious cybercriminals have chosen to cease their activities.
Last month, Angel Drainer, a malware service linked to over $25 million in thefts, ceased operations. Additionally, in November, the multi-chain crypto scam service Inferno Drainer also shut down its services.
Related News
Hamster Kombat is not a scam. The new generation of millionaires
2024-09-01 06:27:00Pavel Durov, the founder of Telegram, has been apprehended in France.
2024-08-26 19:42:00Add a Comment
Please login to your account to post a comment.
Popular News
Democrats are aiming to attract the crypto community to support Harriss success.
2024-08-09 12:47:00
Coinbase to Launch MiCA-Compliant EURC Conversions Beginning August 28
2024-08-23 11:27:00
Poloniex exchange hacked again Stop depositing and withdrawing assets
2023-11-11 10:08:02
Meta $4.5 billion loss in the last 3 months. Metaverse bubble destruction domino activated?
2024-08-02 13:44:00
Important tips for the successful entry of inexperienced people into digital currencies
2024-03-14 10:32:00
TonKeeper Wallet Tutorial
comprehensive coinbase exchange review
cryptoeconomie is an independent media outlet covering the cryptocurrency industry. Its journalists adhere to a strict set of editorial policies. cryptoeconomie has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. cryptoeconomie provides essential analysis of the cryptocurrency market. Our goal is to inform, educate and share valuable information with our readers. Our editorial content is based on our passion for providing unbiased news, in-depth analysis, comprehensive cryptocurrency price charts, insightful opinions, as well as regular reporting on the social transformation that cryptocurrencies are bringing. We believe that the world of blockchain and cryptocurrencies will grow exponentially and become an integral part of our daily lives. We work every day to help educate our readers and raise awareness of the complexities and benefits offered by today’s digital revolution.
Categories
- NFT
- Defi
- Metaverse
- News
- Crypto Exchanges
- Web3
- Crypto Exchanges News
- Stablecoins
- Altcoins
- Bitcoin
- Technologi
- Artificial Intelligence
- Crypto Learning
- Crypto Glossary
- Crypto Exchanges Training
- Ethereum
- Solana
- Regulation
- Crypto Reviews
- Centralized Exchanges
- Decentralized Exchanges
- Crypto Wallet
- Crypto Investment Training
- Trading Education
- Crypto Projects
© Copyright 2024 cryptoeconomie.com . Design by: uiCookies
Comments
Sm,kamel
One of the most important signs that your computer operating system is infected with this malware is what I am writing below.
1- Reducing the speed of simple operations that are completely smooth in normal mode.
2- The device turns off and on automatically
3- The main programs do not run
If you see any of the above, see an operating system specialist
Replay