Mt. Gox CEO doxing was a ploy to spread Bitcoin-stealing malware
Posted on 17.03.2014
The recent hacking and defacing of the blog and Twitter account of Mt. Gox CEO Mark Karpeles, and the leaking of a 716 Mb archive file that allegedly contained trade data, database dumps, personal information about Karpeles, and an app for remotely accessing Mt. Gox data, has apparently been a clever ruse to make users download Bitcoin-stealing malware.

According to Kaspersky Lab expert Sergey Lozhkin, the file does contain (publicly available) data related to Mt. Gox trades, but also a Windows and a Mac Trojan.

"When the victim executes the application, it looks like the back-office software for accessing the databases of Mt. Gox-s owning company, Tibanne Co. Ltd.," he shared.


In the background, the malware creates and executes the TibanneSocket.exe binary and searches for bitcoin.conf and wallet.dat files on the target's computer. If the latter file is found unencrypted, the criminals behind this scheme will easily access and steal the bitcoins stored in it.

The C&C server to which the information is exfiltrated is located in Bulgaria, but is currently offline.

This is not the first time that cyber crooks have taken advantage of Mt. Gox users' desperation to scam the. Earlier this month scammers claimed that Mt. Gox will return all the lost Bitcoins, and urged users to watch a video detailing the process. In order to do so, they were required to download a fake and malicious Adobe Flash Player.

"Malware creators often using social engineering tricks and hot discussion topics to spread malware, and this is great example of an attack on a focused target audience," commented Lozhkin.

In fact, it seems that Mt. Gox users have already been targeted with phishing emails impersonating the exchange and asking them to share their name, address, username and password, and bank account number.









Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //