قالب وردپرس درنا توس
Home https://server7.kproxy.com/servlet/redirect.srv/sruj/smyrwpoii/p2/ Technology https://server7.kproxy.com/servlet/redirect.srv/sruj/smyrwpoii/p2/ Request MetaMask Fake That Hijacks Ethereum dApps End With Google

Request MetaMask Fake That Hijacks Ethereum dApps End With Google



Using Google, at the beginning of the month, still other malware software that hackers use to steal cryptocurrencies. Experts at an IT security firm, Eset escaped from the company until MetaMask had a fake app on the Google Play Play.


Clipper Malware to Manage & #;; MetaMask App & # 39;

Lukas Stefanko, a malware researcher at Eset, published the news on the company's website last Friday (February 8, 2019) . By post, Eset experts found a malicious app "Android / Clipper.C" which was a MetaMask.

The report suggests that the Ethereum owners who have successfully completed the application download that their private keys are in danger and their funds are consumed. Like other cutters, this malware could also replace the victim's clipboard to their name Bitcoin or Ethereum. [1

9659005]  Android Bitcoin Clipper Malware

MetaMask allows users to run decentralized apps (DApps) on the Ethereum platform through a browser add-on without the whole network node Currently, there is no mobile app at the service.

Android / Clipper.C is not the first app to understand MetaMask on the Google Play Store. Back in 2018, Google sent the MetaMask mobile application was available ro Here, and it seems he has a room for many malicious changes to the service.

Faux-MetaMask usually employs fishing techniques to access user funds held in the encryption wallet. Meanwhile, MetaMask announced in November 2018 plans to re-launch the mobile application after the continued success of the browser add-on with more than one million full downloads

Capture Cryptocurrency through Hijacking Clip

This content is malicious that he knows MetaMask is from a phishing to clipping that shows the growth threat of cryptography stealing through clipboard cleaning. In July 2018, Bitcoin reported that malware hijacking clip monitored about 2.3 million Bitcoin addresses.

Since wallet addresses are composed of many alpha-numeric characters, most people copy and paste them while making transactions to avoid costly errors. This malicious applications draw this practice by capturing the user clipboard instead of their addresses with the attacks of the attacker.

In order to refuse the victim to remove clipboard, encryption owners should try to upgrade their antivirus software. In addition, eyeball addresses are crucial before sending "forward". You could save five minutes of legal dedication to your precious girlfriend.

What other ways can owners protect cryptocurrency themselves from clipboard cleaning ? Let us know your thoughts in the comments below.


Image courtesy of ESET, Shutterstock


Source link