Hackers are getting bolder in their attempts to steal cryptocurrency. They have stolen more than $1.2 billion in cryptocurrency since January. Reports suggest that most of these hacks are linked to North Korea. The FBI issued a public service announcement on September 3, warning the cryptocurrency industry about North Korean hackers. Let’s take a look at what types of software you should be wary of.
Warning for Android users
Software security firm McAfee has identified an Android malware called SpyAgent that uses Optical Character Recognition (OCR) capabilities and scans the phone’s memory for images, including screenshots containing private keys. Keep in mind that all decentralized wallets recommend that you do not take screenshots of your private key screens and that it is best to write them down for safekeeping.
According to McAfee Labs, the malware is distributed via malicious links sent via text messages. These programs are disguised as banking apps and, upon installation, request access to the entire phone, including photos and media.

Imagine you get a text message saying you are using an old version of your banking app, click here to update and enjoy the latest features. Instead of checking this information on the Play Store, you click the link which opens a website that looks like your bank’s website. You download and install the app and now all your data is accessible to hackers.
The FBI has also warned the crypto community about highly targeted social engineering attacks. This malware works in a similar way. And these malware can be disguised as not only your banking app, but also another government app or even a game.
Malware attacks on MacOS
If you use MacOS and think your system is immune to such malware, think again. In August, similar to SpyAgent, a malware called Cthulhu Stealer was identified attacking MacOS. Like all malware, it disguises itself as legitimate software. Once downloaded, it steals the user’s personal information including all sorts of passwords. It also collects passwords for wallets like MetaMask and any private keys stored on the system along with the IP address.
In August, North Korean hackers exploited a vulnerability in the Google Chrome web browser. They then created websites that impersonated legitimate cryptocurrency trading platforms and lured users into downloading a digital wallet or cryptocurrency trading app, which was actually malware.
What is the solution?
As hackers become more and more interested in cryptocurrencies, malware techniques are also increasing. It is very important for users of any device to download any application from its official source. You must check the website url. Cryptocurrency users should never store images containing access phrases or write them on their computers or mobile phones at all costs. Always pay close attention to what you are downloading, what websites you are browsing, and do not download applications from unknown sources.
DYOR! #Write2Win #Write&Earn