Attackers Use Tor to Steal Cryptocurrency

Increasing Use of Trojan Cryptoclipper to Steal Cryptocurrencies

Kaspersky Lab, a team of cyber security experts, has recently discovered a new campaign designed for the theft of cryptocurrencies. The researchers have found that cybercriminals are employing the Trojan Cryptoclipper by distributing it on third-party internet resources disguised as a browser. This allows the cybercriminals to install an anonymous network connection which is protected from interception.

A key factor of this network is its ability to provide transmission of data in an encrypted form, making it an anonymous network. Trojan Cryptoclipper is mainly written in programming languages ​​C, C ++, and Python.

The hackers responsible for the campaign have been stealing valuable cryptocurrencies from their victims using this method, which is becoming more and more prevalent amongst the cybercriminal community. As it stands, cryptocurrencies are still largely unregulated, making them an attractive target for hackers.

Therefore, cryptocurrency holders should be vigilant and take extra measures to protect their assets. One way of doing so is to refrain from using third-party internet resources for cryptocurrency transactions and installing reputable anti-virus software on any devices used for cryptocurrency transactions.

/Reports, release notes, official announcements.