LeakyInjector and LeakyStealer Malware Threats

Source: Cyber Security News

The LeakyInjector injects the LeakyStealer malware into the explorer.exe process to begin stealing sensitive information related to cryptocurrency wallets and browser history. This attack involves targeting popular wallets like Electrum and browser-based extensions such as MetaMask and Coinbase Wallet.

The malware utilizes a polymorphic engine to evade detection and is digitally signed to appear legitimate. Once active, it communicates with a command-and-control server, allowing attackers to send additional commands or execute more malware on the infected system. Users are urged to enhance their security measures by updating software and avoiding untrusted downloads to mitigate the risks posed by this malware.

👉 Pročitaj original: Cyber Security News