Last updated:
The FBI has issued a warning about a sophisticated new Android malware called SpyAgent, discovered by McAfee, which is designed to steal cryptocurrency private keys from users’ smartphones.
SpyAgent targets private keys by leveraging optical character recognition (OCR) technology to scan and extract text from screenshots and images stored on the device.
McAfee’s analysis reveals that SpyAgent is distributed through malicious links sent via text messages.
Malware Masquerades as Various Programs
When users click on these links, they are redirected to seemingly legitimate websites that prompt them to download an app disguised as a trustworthy program.
In reality, this app is the SpyAgent malware, which compromises the phone’s security once installed.
The malware masquerades as various types of applications, including banking apps, government services, and streaming platforms.
Upon installation, it requests permissions to access contacts, messages, and local storage, facilitating its extraction of sensitive data.
McAfee reports that SpyAgent has been detected in over 280 fraudulent apps and is primarily targeting South Korean users.
The alert comes on the heels of another malware threat identified in August.
The “Cthulhu Stealer,” which affects MacOS systems, similarly disguises itself as legitimate software and targets personal information, including MetaMask passwords, IP addresses, and cold wallet private keys.
The same month saw Microsoft uncover a vulnerability in Google Chrome, which North Korean hacker group Citrine Sleet exploited to create fake cryptocurrency exchanges and fraudulent job applications.
These activities led to the installation of remote-controlled malware that also stole private keys.
The vulnerability in Chrome has since been patched, but the rise in these types of cyberattacks has prompted the FBI to issue a formal warning about North Korean hacking activities.
Users are advised to remain vigilant and avoid downloading apps or clicking on links from unknown sources to protect their digital assets from such sophisticated threats.
Crypto Projects Lost $310M to Scams in August
As reported, August saw a surge in crypto-related scams, with a staggering $310 million lost to various exploits, making it the second-highest monthly total this year.
However, $10.3 million of the stolen assets were eventually recovered or returned, leaving the net loss at $300.6 million.
Phishing incidents emerged as the most damaging, accounting for approximately $293 million of the total losses.
Two particularly large-scale phishing attacks resulted in the theft of $238 million in Bitcoin and $55 million in DAI stablecoin.
Aside from phishing, other notable losses in August included attacks on several crypto projects.
For instance, the Ronin Network, an Ethereum Virtual Machine (EVM)-based sidechain, was exploited by a white hat hacker on August 6, resulting in the theft of 4,000 ETH, valued at $9.85 million at the time.
Additionally, flash loan attacks, though still concerning, resulted in relatively lower losses of $1.2 million in August compared to previous months.
In contrast to the rise in phishing and other forms of exploitation, exit scams saw a significant decline, with losses dropping to $800,000 in August, down from around $3 million in July.