Shitcoin Wallet Pushing Malicious Codes, Collecting Exchange Credentials

Shitcoin Wallet, a web-based Ethereum wallet, is injecting malicious javascript codes to the wallet users, stealing crucial information.
Revealed by Harry Denley, a security and anti-phishing expert, on Monday, the vulnerable codes are collecting credentials of major crypto platforms including Binance, MyCryptoWallet, and many others.

⚠️ A browser crypto wallet is injecting malicious JS to steal secrets from

Extension-native wallet create also sends secrets to their backend!

Bad guys: erc20wallet[.]tk
ExtensionID: ckkgmccefffnbbalkmbbgebbojjogffn

— harrydenley.eth ◊ (@sniko_)

works as a Chrome extension that downloads loads of javascript files from a remote server. The code then looks for any open tabs on the web browser containing pages of any digital asset exchanges and Ethereum network tools to scrape the data in those windows.
The malicious codes send all the data to a remote server identified as “erc20wallet.tk.” The top-level domain belongs to a group of the south pacific island territory of New Zealand called Tokelau.
A suspiciously named wallet indeed
Designed to hold Ethereum and other ERC-20 tokens, the company claims that it has over 2,000 users. The platform basically operates as browser extensions, even though per the company, there is a desktop application for Windows.
“It is a web wallet which has several extensions for different browsers,” a blog post by the company explained.
Meanwhile, many browser extensions were found in the past with malicious codes. However, most of those were indulged in the on victims’ computers.
Most recently, Google banned widely used Ethereum wallet and DApp browser for violating its financial policy from Play Store. Though not specified, the tech giant was indicating the crypto mining feature, which is strictly bans in its policy. Notably, the platform does not offer any crypto mining services to its users.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *