A new strain of crypto-malware is being spread via YouTube, tricking users to download software that’s designed to steal data from 30 crypto wallets and crypto-browser extensions.
Cyber intelligence company Cyble in a June 30 blog post said it had been tracking the malware known as PennyWise — likely named after the monster in Stephen King’s horror novel It — since it was first identified in May.
“Our investigation indicates that the stealer is an emerging threat,” wrote Cyble in a blog post on June 30:
“In its current iteration, this stealer can target over 30 browsers and cryptocurrency applications such as cold crypto wallets, crypto-browser extensions, etc.”
Data stolen from the victim’s system comes in the form of Chromium and Mozilla browser information, including cryptocurrency extension data and login data. It can also take screenshots and steal sessions of chat applications such as Discord and Telegram.
The malware also targets cold crypto-wallets such as Armory, Bytecoin, Jaxx, Exodus, Electrum, Atomic Wallet, Guarda and Coinomi, as well as wallets supporting Zcash (ZEC) and Ether (ETH) by looking for wallet files in the directory and sending a copy of the files to attackers, according to Cyble.
The cybersecurity company noted that the malware is being spread on YouTube mining education videos purporting to be free Bitcoin mining software.
The cybercriminals, or “Threat Actors,” upload videos instructing viewers to visit the link in the description and download the free software while also encouraging them also to disable their antivirus software which enables the malware to run successfully.
Cyble said the attacker had as many as 80 videos on their YouTube channel as of June 30. However, the channel identified has since been removed.
A search by Cointelegraph found similar links to the malware remain on other smaller YouTube channels, with videos promising free nonfungible token (NFT) mining, cracks for paid software, free Spotify premium, game cheats and mods.
Many of these accounts have only been created within the last 24 hours.
Interestingly, the malware is designed to stop itself if it finds out the victim is based in Russia, Ukraine, Belarus and Kazakhstan. Cyble also found that the malware converts the victim’s stolen timezone data to Moscow Standard Time (MSK) when the data is sent back to the attackers.
In February, malware named Mars Stealer was identified as targeting crypto wallets that work as Chromium browser extensions such as MetaMask, Binance Chain Wallet or Coinbase Wallet.
Chainalysis warned in January that even “low-skilled cybercriminals” are now using malware to take funds from crypto hodlers, with cryptojacking accounting for 73% of the total value received by malware-related addresses between 2017 and 2021.