#cryptocurrencytheft

2025-05-28

Crypto heists just got scarier. The Dark Partners mix zero-day hacks, phishing, ransomware... and even physical coercion to steal digital assets. How safe is your crypto wallet in this new era of cybercrime?

thedefendopsdiaries.com/the-da

#cybercrime
#cryptocurrencytheft
#zerodayexploits
#ransomware
#socialengineering

2023-11-24

Charges laid in police impersonation, break and enter, assault and $10M B.C. theft investigation
Multiple charges have been laid against a B.C. man in connection with a 2022 home invasion where thieves made off with $10 million in cryptocurrency.
#globalnews #Crime #cryptocurrencytheft #JinDaXing #Richmond
globalnews.ca/news/10112521/ch

2023-11-24

Charges laid in police impersonation, break and enter, assault and $10M B.C. theft investigation
Multiple charges have been laid against a B.C. man in connection with a 2022 home invasion where thieves made off with $10 million in cryptocurrency.
#globalnews #Crime #cryptocurrencytheft #JinDaXing #Richmond
globalnews.ca/news/10112521/ch

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-10-02

"🐰 BunnyLoader Unleashed: The Newest Kid on the Malware Block 🐰"

In a recent discovery, Zscaler ThreatLabz stumbled upon a new Malware-as-a-Service (MaaS) threat named "BunnyLoader" being peddled on various forums. This nefarious service offers a plethora of malicious functionalities including downloading and executing a second-stage payload, pilfering browser credentials and system information, keylogging, and even cryptocurrency theft through clipboard manipulation. 🕵️‍♀️💻

The malware, written in C/C++, is sold for a lifetime price of $250 and is under rapid development with multiple feature updates and bug fixes. It employs various anti-sandbox techniques during its attack sequence to evade detection and has a fileless loader feature which executes further malware stages in memory. BunnyLoader's C2 panel allows the threat actor to control infected machines remotely, showcasing a list of various tasks including keylogging, credential theft, and remote command execution among others. 🛑🔐

The detailed technical analysis reveals how BunnyLoader maintains persistence, performs anti-VM techniques, registers with the C2 server, and executes its core malicious tasks. The malware also harbors a clipper module to replace cryptocurrency addresses in a victim's clipboard with addresses controlled by the threat actor, targeting multiple cryptocurrencies like Bitcoin, Ethereum, and Monero. 🪙💸

The article is a comprehensive dive into the technical intricacies of BunnyLoader, shedding light on its modus operandi and the potential threat it poses to individuals and organizations alike. 🧐🔍

Source: Zscaler ThreatLabz

Tags: #BunnyLoader #MalwareAsAService #CyberSecurity #ThreatAnalysis #Malware #CryptocurrencyTheft #Zscaler #ThreatLabz #InfoSec

Authors: NIRAJ SHIVTARKAR, SATYAM SINGH

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst