Crast.net
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons
No Result
View All Result
Crast.net
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons
No Result
View All Result
Crast.net
No Result
View All Result

Hackers are using Web3 backdoor wallets to steal seed phrases from iOS/Android users

by Tracy Lopez
June 14, 2022
in News
Hackers are using Web3 backdoor wallets to steal seed phrases from iOS/Android users

A Chinese-speaking, technically proficient threat actor distributes backdoor applications to extort cash from victims in a newly discovered large-scale operation.

Trusted security researchers have shared details of a large-scale operation launched by a technologically advanced, sophisticated threat actor. The actor distributes backdoor applications through fake versions of authentic cryptocurrency wallet websites to withdraw funds. The activity cluster, dubbed SeaFlower, is reportedly targeting iOS and Android users.

The Confident researchers noted that Trojanized cryptocurrency apps are very similar to their real versions. However, they contain a backdoor that can steal a user’s security step, allowing attackers to access their digital assets.

attack method

The SeaFlower operation leverages website cloning, SEO poisoning, and black SEO techniques to distribute Trojanized apps to a wide range of users. Targeted applications include the iOS and Android versions of MetaMask, Coinbase Wallet, ImToken and TokenPocket.

These apps are distributed through Chinese search engines such as Sogou and Baidu. The search terms have been rigged, so when someone searches for Download Metamask iOS, the drive-by download page results appear at the top of the first page.

Unsuspecting users stumble upon suspicious sites, which act as a conduit to entice victims to download Trojanized versions of the Wallet app. These apps have been modified to look similar to the original versions but have additional code to extract the seed phrase and send to remote domains.

Also read: The best websites to find phrases for Instagram

Attackers can promote backdoor apps and use malware on social media platforms and forums, but the major distribution channel is search engines.

seaflower purpose

According to a blog post by Taha Karim of Confident, the main objective behind this campaign appears to be to modify the Web3 wallet with backdoor code to take out the seed phrase. SeaFlower operators have also engineered the activity to target iOS users through provisioning profiles to enable apps for sideloading on the device.

For your information, provisioning profiles help to connect tools and developers to an unprivileged development team. In this way, the tools can be used to test app code and add malicious apps to the devices.

Chinese connection

Analysis of source code comments, macOS usernames, and the involvement of Alibaba’s CDN (content delivery network) in backdoor coding ties this campaign with a yet-to-be-revealed Chinese-speaking organization.

The researchers claim they discovered the campaign in March 2022 and refer to SeaFlower as “the most technologically sophisticated threat targeting Web3 users, right after the infamous Lazarus group.”

Why sea flowers?

As to why the Confident researchers dubbed Seaflower Activity, they noted that one of the .dylib files injected into the Trojanized MetaMask app’s Mach-O leaked a macOS username named “zhang heik”. When he Googled the term, several Chinese language references came up, one of which was a character in the Chinese novel “Tibetan Sea Flower”.

security measures

Chinese hackers have always been known to be dangerous and highly sophisticated. It may be because of the unlimited resources supported by the government or they are good at it. Nevertheless, downloading apps and software from third-party markets should be strictly avoided.

Always download mobile apps from official stores: Apple Appstore and Play Store. Never install or accept random provisioning profiles on your iPhone, as you saw in this blog post, they allow the download of unverified software that could potentially steal your crypto.

Taha Karim – Confidant

More Chinese Hackers in the News

  1. Iranian and Chinese state hackers exploiting Log4j vulnerability
  2. Russian-language hacking forums are heating up to Chinese hackers
  3. Chinese APT Group FoundCore RAT . is spying on the vietnam army with
  4. Microsoft disrupts the activities of Chinese hackers by seizing 42 websites
  5. Unofficial micropatch for Follina released as exploit of Chinese hackers 0-day

Source

Related News

Samsung Z Fold 3 on Amazon has never been more capable

Samsung Z Fold 3 on Amazon has never been more capable

by James Kaufman
July 1, 2022

While many retailers are gearing up with some exciting sitewide sales for the Fourth of July weekend, there are plenty...

Sticking with Windows 10?  Change these default settings

Sticking with Windows 10? Change these default settings

by Vincent Ledbetter
July 1, 2022

Microsoft launched its latest operating system Windows 11 in October last year. The OS reached wide deployment earlier this year...

OxygenOS 12 Open Beta 1 Offers Android 12 to OnePlus 7/7T

OxygenOS 12 Open Beta 1 Offers Android 12 to OnePlus 7/7T

by Tracy Lopez
July 1, 2022

OnePlus announced OxygenOS 12 open beta for 7 and 7T. OnePlus announced OxygenOS 12 open beta for 7 and 7T....

Google and Vodafone join forces to extend Wear OS battery life

Google and Vodafone join forces to extend Wear OS battery life

by Tracy Lopez
July 1, 2022

Smart watches have low-capacity batteries and any small factor can have a big impact on autonomy. With this in mind,...

  • Privacy Policy
  • Terms and Conditions
  • Dislcaimer

© 2022 Crast.net - Gadget and Tech News.

No Result
View All Result
  • News
    • Internet
  • Apps
  • Smartphones
    • Android
    • Apple
  • Devices
  • How to
  • Computer
    • Windows
    • Security
  • Reviews
  • Games
  • More
    • Comparisons

© 2022 Crast.net - Gadget and Tech News.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.