Attacker Targets Wealthy Crypto Funds Using Telegram Chats
In the latest type of crypto-focused attacks, an attacker known as DEV-0139 has targeted wealthy cryptocurrency funds through the use of Telegram group chats, Microsoft's Security Intelligence team said in a report on Wednesday.
Fees levied by crypto exchanges on transactions are a big challenge for investment funds and wealthy traders. They represent a cost and must be optimized to minimize the impact on margins and profits. Like many other companies in this industry, the largest costs come from fees charged by exchanges.
The attacker or group of attackers capitalized on this specific problem to lure their crypto fund targets.
DEV-0139 joined several Telegram groups, used by high-profile clients and exchanges for communication, and identified their target from among the group members. OKX, Huobi and Binance exchanges were targeted, data from the Microsoft report shows.
Don't download files!
— CZ 🔶 Binance (@cz_binance) December 7, 2022
Compromised friends may send a weaponized Excel file with the name "exchange fee comparision.xls". It contains malicious code, encoded backdoor and etc.
Hackers target the cryptocurrency industry - Microsoft Security Blog https://t.co/62F1Yh4u5u
Posing as an exchange employee, DEV-0139 invited the target to a different chat group and pretended to ask for feedback on the fee structures used by exchanges. They then initiated a conversation to gain the target’s trust – using their knowledge of the industry and preparedness to lure victims gradually.
DEV-0139 then sent a weaponized Excel file containing accurate data on fee structures among cryptocurrency exchange companies, with the goal of increasing their credibility.
The Excel file initiated a series of activities, including using a malicious program to retrieve data and drop another Excel sheet. This sheet was then executed in invisible mode and used to download a picture file containing three executables: a legitimate Windows file, a malicious version of a DLL file, and an XOR-encoded backdoor.
A DLL is a library that contains code and data that can be used by more than one program at the same time. On the other hand, XOR is an encryption method used to encrypt data and is hard to crack by the brute-force method
The threat actor was then able to remotely access the infected system through the use of the backdoor.
Microsoft said DEV-0139 may have also run other campaigns using similar techniques.