[vc_row full_width=”stretch_row” css=”.vc_custom_1531732107238{background-color: #fcc118 !important;}”][vc_column]

[/vc_column][/vc_row][vc_row css=”.vc_custom_1531730959461{border-bottom-width: 1px !important;background-color: #f9fafb !important;border-bottom-color: #eef3f7 !important;border-bottom-style: solid !important;}”][vc_column css=”.vc_custom_1531891416301{margin-bottom: 0px !important;}”][bsfp-cryptocurrency style=”widget-6″ align=”auto” columns=”2″ scheme=”light” coins=”top-x-coins” coins-count=”8″ coins-selected=”” currency=”USD” title=”Cryptocurrencies” show_title=”0″ icon=”” heading_color=”” heading_style=”default” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ css=”.vc_custom_1531730265600{margin-bottom: 0px !important;}” custom-css-class=”” custom-id=””][/vc_column][/vc_row]

Attackers use name of lead exchanges to target crypto startups


Tech giant Microsoft uncovered an attack targeting crypto startups using a pdf file that uses the names OKX, Binance, and Huobi.

The pdf file is titled “OKX, Binance & Huobi VIP fee comparison.xls.” and includes a malicious code that allows the attackers to access the victim’s software remotely, and run an excel macro in invisible mode on the background.

The attack

According to the document, Microsoft detected that the attacker had infiltrated chat groups on Telegram and pretended to be the representative of the exchange platforms in question.

Attack overview
Attack overview

It was realized that the attacker had in-depth knowledge in the matter as well, which he utilized to gain the trust of various crypto companies. Afterwards, the attacker convinced its victims to download the document in question.

Microsoft also warned that there might be other actors that use a similar method to infiltrate into systems.

Read Our Latest Market Report

Connect your wallet, trade with Orion Swap Widget.

Directly from this Widget: the top CEXs + DEXs aggregated through Orion. No account, global access.

Leave A Reply

Your email address will not be published.