Threat Management, Threat Management, Malware, Ransomware

Crooks fabricate SpriteCoin cryptocurrency as lure to download ransomware

Heard of the hot new cryptocurrency SpriteCoin? No? That's because it's a fictional fairy tale cooked up by cybercrooks as a ruse to infect wannabe miners with a particularly devilish ransomware program.

In a Jan. 22 blog post, researchers from Fortinet's FortiGuard Labs team warn that SpriteCoin ransomware not only encrypts computers' files, but also harvests Chrome and Firefox browser credentials, stores them using an embedded SQLite engine, and then transmits them to the malicious actors' Tor website via POST requests.

Although SpriteCoin may not exist, the adversaries are certainly taking advantage of genuine digital currency to receive their ransom payments. In a somewhat unusual twist, however, the actors are demanding payment not in Bitcoin, but in Monero, a cryptocurrency gaining in popularity among cybercriminals because its wallet addresses remain anonymous.

Even if victims pay the 0.3 Monero ransom (worth around $90 as of Jan. 23), the SpriteCoin malware doesn't necessarily deliver a working the decryption key – and worse, it downloads a secondary malware program, identified as W32/Generic!tr, capable of harvesting certificates, parsing keys, and surreptitiously activating web cameras.

“This sample, while not highly sophisticated, is unique that it targets victims interested in cryptocurrency, and then providing a secondary malicious component instead of just asking for the ransom,” said Tony Giandomenico, senior security strategist and researcher with Fortinet FortiGuard Labs, in an email interview with SC Media. “Threat actors are doing their homework when targeting end users, and we can safely predict more of the same to come in the future.”

Based on unconfirmed reports, Fortinet believes the primary attack vector for SpriteCoin ransomware is online forums, using cryptocurrency-themed spam to entice viewers into downloading the malicious SpriteCoin wallet app package via a link.

Fortinet further reports that the apparent SpriteCoin homepage describes the fraudulent virtual currency as: “a new cryptocurrency written entirely in JavaScript (with C for the mining module). It uses the CryptoNight algorithm but is not cryptonote-based. With a max supply of 1 trillion coins and a block time of 45 seconds, this is sure to be a profitable coin for you (I hope).”

“The allure of quick wealth through cryptocurrency seems to be enough to trick unsuspecting users to rush toward the wallet app du jour without consideration,” states the FortiGuard Labs blog post.

Users who download the malware receive a prompt to enter a wallet password, with the option of leaving the input field blank. Upon clicking the “Next Step” button, users next see a progress bar and a corresponding message that the package is downloading the blockchain – but in reality, the malware is actually encrypting a variety of files.

Discovered the week of Jan. 15 and observed in the wild as spritecoind[.]exe, the SpriteCoin malware is reportedly UPX-packed for evasion purposes, and connects to the adversaries' anonymous TOR site via an Onion proxy that lets victims communicate with the dark web URL without forcing them to establish a TOR connection first.

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.