BleepingComputer reports that more than $5.9 million worth of cryptocurrency has been pilfered by the Inferno Drainer cryptocurrency phishing and scam service from 4,888 victims.
Over 689 fraudulent websites have been created by Inferno Drainer to target 229 widely known brands, including MetaMask, OpenSea and LayerZero, since late March, according to Scam Sniffer researchers, who discovered the Inferno Drainer through an ad on Telegram promoting that touted a $103,000 theft done with the cryptophishing service.
"By querying the transaction hash obscured in the screenshot, we found this transaction in ScamSniffer's database and associated it with some known malicious addresses in our malicious address database," Scam Sniffer said.
Further analysis revealed that Inferno Drainer has begun activity in February before ramping up since the middle of last month. Mainnet was the primary source of the stolen cryptocurrency assets, followed by Arbitrum, Polygon, and BNB, said researchers, who added that stolen proceeds have been distributed by attackers acrosss five cryptocurrency addresses.
New attacks with the updated SysUpdate toolkit have been deployed by Chinese advanced persistent threat operation Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix, against an Asian government and a Middle East-based telecommunications provider, reports The Hacker News.
Forty-five malicious NPM and PyPI packages have been deployed by threat actors to facilitate extensive data theft operations as part of a campaign that commenced on Sept. 12, according to BleepingComputer.
Sixty thousand emails from U.S. State Department accounts were noted by a staffer working for Sen. Eric Schmitt, R-Mo., to have been exfiltrated by Chinese threat actors during the widespread compromise of Microsoft email accounts that commenced in May, according to Reuters.