Ambient Finance website hacked, team warns users to wait for fix
The front end for Ambient Finance, a decentralized trading protocol, was compromised on Oct. 17, and the team has warned users not to interact with the site, connect wallets, or sign transactions at this time.
According to Ambient Finance, the website domain was hacked, but the hijacked website is an isolated incident. The team reassured customers that Ambient contracts and funds remain safe.
Shortly following the hack, Ambient Finance managed to recover the domain but is currently waiting on DNS to update and propagate. Spokespeople for Ambient warned users to wait for an “all clear” to interact with the website again.
Security firm Blockaid revealed that the infamous Inferno Drainer, a malware suite designed to steal digital assets, was used in the hack, noting that the C2 server that launched the attack was created 24 hours ahead of the incident.
Source: Blockaid
Related: Crypto-stealing malware discovered in Python Package Index — Checkmarx
Respect every click: Malware becomes more sophisticated
Unfortunately, the Ambient Finance hack is not unique, and malware attacks are becoming increasingly sophisticated. Developers have long believed that Apple’s macOS was generally immune to malware.
However, there has been a recent uptick in malware targeting macOS systems. In August 2024, a new form of malware called “Cthulhu Stealer” was identified by cybersecurity firms.
Cthulhu Stealer disguises itself as a genuine macOS program that is installed on the desktop and steals sensitive data and private keys — emptying crypto wallets in the process.
Security specialists at McAfee Labs discovered malware targeting Android operating systems called “SpyAgent” in September. SpyAgent uses optical character recognition to scan images and steal sensitive information stored in images, including pictures taken of private keys.
SpyAgent spread through text message links that initiated downloads of seemingly harmless applications, which were just disguised versions of the malware. Researchers at McAfee identified over 280 fraudulent applications, all tied to SpyAgent.
Cybersecurity firm Facct also recently uncovered a unique method of malware distribution that uses automated emails to install modified XMrig mining software . This modification of the legitimate software allows malicious actors to mine cryptocurrencies using the compromised devices of victims.
Magazine: Fake Rabby Wallet scam linked to Dubai crypto CEO and many more victims
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
Scroll refutes allegations of ‘predatory’ airdrop
Crypto user convinces AI bot Freysa to transfer $47K prize pool
Google asks appeals court to reverse Epic Games’ antitrust case win
Ether ETFs are beating their Bitcoin counterparts amid recent ETH rally