The post North Korean Malware Hits Ethereum and BSC Wallets: Details appeared on BitcoinEthereumNews.com. According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package. The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask.  Modus operandi  A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers. Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers.  Immediate actions Those who think that they were exposed to the attack should assume that their hot wallets were compromised.  Attackers typically steal extension files and passwords together with seed phrases to drain wallets.  One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked.  It would also be advisable to wipe and reinstall the operating system, given that such malware  In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs. $2 billion worth of stolen crypto  Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year. The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion.  Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-detailsThe post North Korean Malware Hits Ethereum and BSC Wallets: Details appeared on BitcoinEthereumNews.com. According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package. The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask.  Modus operandi  A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers. Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers.  Immediate actions Those who think that they were exposed to the attack should assume that their hot wallets were compromised.  Attackers typically steal extension files and passwords together with seed phrases to drain wallets.  One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked.  It would also be advisable to wipe and reinstall the operating system, given that such malware  In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs. $2 billion worth of stolen crypto  Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year. The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion.  Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-details

North Korean Malware Hits Ethereum and BSC Wallets: Details

2025/10/19 17:05

According to a recent report by cybersecurity firm Cisco Talos, hackers linked to North Korea delivered malicious JavaScript via a fake cryptocurrency application and an npm package.

The malware, which has been dubbed “OtterCookie/BeaverTrail,” is capable of stealing keystrokes, clipboard content, screenshots, and browser wallets of the likes of Metamask. 

Modus operandi 

A potential victim is typically lured with a bogus job or freelance gig. The attacks install malware with the help of an obfuscated JavaScript payload and collect sensitive data. The stolen files then get uploaded to the attacker’s servers.

Notably, the hackers use a crypto app as bait, so they are specifically targeting those users who already have crypto wallets on their computers. 

Immediate actions

Those who think that they were exposed to the attack should assume that their hot wallets were compromised. 

Attackers typically steal extension files and passwords together with seed phrases to drain wallets. 

One should immediately start moving funds and revoke token approvals for old wallets that were potentially hacked. 

It would also be advisable to wipe and reinstall the operating system, given that such malware 

In order not to fall victim to hackers in the first place, one should refrain from running code from untrusted sources. They can be run via containers or VMs.

$2 billion worth of stolen crypto 

Earlier this month, TechCrunch reported that North Korean hackers had already stolen roughly $2 billion worth of crypto this year.

The report, which cites data from blockchain sleuth Elliptic, says that the total amount of crypto stolen by the “Hermit Kingdom” currently stands at $6 billion. 

Source: https://u.today/north-korean-malware-hits-ethereum-and-bsc-wallets-details

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

HKEX Enforces Regulations on Crypto Treasury Companies

HKEX Enforces Regulations on Crypto Treasury Companies

The post HKEX Enforces Regulations on Crypto Treasury Companies appeared on BitcoinEthereumNews.com. Key Points: HKEX enforces listing rules, impacting firms shifting to crypto treasuries. Five companies questioned over crypto asset plans. Stricter crypto hoarding rules in Asia-Pacific exchanges. The Hong Kong Stock Exchange scrutinized the strategic transitions of five companies into Cryptocurrency Treasury structures, questioning their adherence to regulations prohibiting large holdings of liquid assets. This regulatory stance highlights Hong Kong’s rigorous listing requirements, impacting companies’ strategic moves in handling digital assets and shaping broader crypto market dynamics in the Asia-Pacific region. HKEX Challenges Firms Shifting to Digital Asset Models In response to escalating scrutiny, the Hong Kong Stock Exchange reiterated that all listing applicants must operate viable businesses. Recent reports cite that five companies planning to pivot to digital asset treasury (DAT) models face regulatory questions over their strategy, challenging their compliance with existing listing rules. The HKEX’s framework prohibits excessive liquid asset holdings. Companies aiming to transform into DAT entities must integrate crypto assets as a core business. These measures emphasize registered entities cannot hoard digital assets like Bitcoin without a solid business model. “For companies intending to hoard cryptocurrencies, approval depends on whether they can demonstrate that acquiring crypto assets is a core component of their business operations.” — Simon Hawkins, Partner at Latham & Watkins Regulatory Impact on Crypto Holdings and Market Response Did you know? The Australian Securities Exchange enforces a similar policy, limiting cash or crypto holdings to less than 50% of a company’s balance sheet, causing some firms to relocate to New Zealand for flexibility. According to CoinMarketCap, Bitcoin (BTC) currently trades at $108,439.78 with a market cap of $2.16 trillion as of October 22, 2025. It holds a market dominance of 59.01%. The 24-hour trading volume has increased by 71.13% to $104.04 billion, highlighting increased market volatility and interest. Recent data shows Bitcoin’s price…
Share
2025/10/22 12:34
Share
Hsiao-Wei Wang, Co-Executive Director of the Ethereum Foundation: Large-scale adoption of Ethereum requires overcoming three major gaps: scalability, user experience, and trust.

Hsiao-Wei Wang, Co-Executive Director of the Ethereum Foundation: Large-scale adoption of Ethereum requires overcoming three major gaps: scalability, user experience, and trust.

PANews reported on October 22nd that at the ETHShanghai 2025 main forum, Hsiao-Wei Wang, Co-Executive Director of the Ethereum Foundation, delivered a speech titled "Mass Adoption of Ethereum: Bridging the Chasm." He stated that Ethereum's vision for mass adoption can be embodied in three key areas: first, self-control, allowing users to truly own their assets; second, global settlement capabilities, enabling value to transcend geographical boundaries, improving overall efficiency, and enabling global verification; and third, everyday utility, allowing blockchain and Ethereum to be naturally and smoothly integrated into people's daily lives, just like the internet, for example, in everyday money transfers. She also pointed out that Ethereum faces three major challenges before it can bridge the chasm: high scalability and cost barriers, a user experience gap, and a trust gap. Regarding scalability, Ethereum's path is L1 ✖️ L2, with its core strategy being to achieve high throughput and low-cost transactions through L2 Rollups. Key upgrades include Dencun (EIP-4844), Pectra (Q1 2025), and Fusaka (Q4 2025). Regarding accounts and user experience, the concept of account abstraction has been proposed, and smart accounts have been introduced through proposals such as ERC-4337, EIP-7701, and EIP-7702. These transform user accounts into programmable contracts and support social recovery wallets, gas payment, and batch transactions. Regarding infrastructure development, the emphasis is on secure and stable mainchain infrastructure and the integration of finance into everyday life. She also stated that Ethereum's future goal is to no longer be "seen," but to be silently relied upon and trusted, just like the internet. True mass adoption comes not from Ethereum's inherent size, but from its ubiquity, transparency, and reliability. When it exists as naturally as air, blockchain will truly realize its value.
Share
2025/10/22 11:50
Share