GreedyBear Stole $1M in Crypto Using Over 650 Scam Tools

byrn
By byrn
2 Min Read


A cybercrime group named GreedyBear has stolen more than $1 million in cryptocurrency by combining several types of scams, according to an August 7 report from Koi Security.

Researcher Tuval Admoni stated that the group has moved beyond typical scams and is operating at a much larger scale.

While many attackers focus on one method, such as phishing websites or fake browser add-ons, GreedyBear spreads fake browser extensions, builds convincing scam websites, and uses harmful software to steal information from crypto users.

Layer 2 Scaling Solutions Explained With Animations

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe – We publish new crypto explainer videos every week!

Koi Security found more than 150 of these fake add-ons on the Firefox extension store. They copied the appearance of crypto wallets like MetaMask, TronLink, Exodus, and Rabby Wallet.

To avoid getting caught, GreedyBear first uploads a harmless version of the extension to pass store checks. After it is approved and gets good reviews, they update it to include code that can steal users’ wallet details.

Admoni said, “These fake tools collect login details from users by pretending to be real wallet interfaces”.

The report also explained that GreedyBear has built over 650 separate tools that target people who use crypto wallets. Additionally, the group runs fake websites that look like exchanges or customer support pages. They also use malware to change wallet addresses or steal copied data during transactions.

Admoni stated in the report:

Most groups pick a lane, maybe they do browser extensions, or they focus on ransomware, or they run scam phishing sites. GreedyBear said, ‘Why not all three?’ And it worked. Spectacularly.

Recently, cybersecurity firm CTM360 reported that scammers are running a campaign called “ClickTok”. What is it? Read the full story.




Source link

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *