Sign up today for an exclusive discount along with our 30-day GUARANTEE — Love us or leave, with your money back! Click here to become a part of our growing community and learn how to stop gambling with your investments. We will teach you to BE THE HOUSE — Not the Gambler!

Click here to see some testimonials from our members!

New Malware Targeting Over 40 Crypto Wallets Discovered in Recent Hacking Attack

By Eric Gozenput. Originally published at ValueWalk.

Malware Crypto Wallets

A new malware dubbed “Mars Stealer” was recently used in several hacking incidents leading to the theft of millions of dollars in cryptocurrency from digital wallets. The Mars Stealer is an upgrade to the Oski trojan which was widely used in malware attacks in 2019. The new malware targets over 40 browser-based digital wallet extensions like Coinbase Wallet, Metamask, and Binance Chain Wallet. Additionally, the malware has capabilities of targeting two-factor authentication (2FA) extensions with a grabber feature that takes the user’s private keys.


Q4 2021 hedge fund letters, conferences and more

New Malware Targets Crypto Wallets

Security experts noted that digital wallets like Ronin Wallet, Nifty Wallet, MetaMask, Coinbase Wallet, Binance Chain Wallet, MEW CX, and TronLink are the main target for hackers using Mars Stealer. The malware targets Chromium-based browsers, which affects the most popularly used browser like Google Chrome, Brave, and Microsoft Edge. Opera and Firefox are less vulnerable but can still be affected by credential-hacking.

The following applications are also being targeted:

  • Internet Explorer
  • Kometa
  • Torch
  • Comodo Dragon
  • Elements Browser
  • CyberFox
  • Authenticator
  • Authy
  • Trezor Password Manager
  • TronLink
  • Yoroi
  • iWallet
  • Neoline
  • ICONex
  • OneKey
  • ZilPay
  • Bitcoin Core
  • Binance
  • MultiDoge

Hackers spread Mars Stealer through several different torrent clients, file-hosting websites, and other downloading systems. Once the system is infected, the malware searches for files with sensitive data like digital wallet addresses and private key info. Once the hacker completes the operation, the malware deletes its presence and activities from the system.

Mars Stealer accesses the following information:

  • IP and country
  • Working path to EXE file
  • Local time and time zone
  • Language system
  • Language keyboard layout
  • Notebook or desktop
  • Processor model
  • Computer name
  • User name
  • Domain computer name
  • Machine ID
  • GUID
  • Installed software and their versions

Accessing The Malware Program

The Mars Stealer is selling on the dark web for $140 for the basic application and $160 for the extended version. At such a low price, it is expected to attract many users to access the malware program. The high number of users will likely increase the number of attacks on unsuspecting cryptocurrency owners who own assets on the targeted wallets.

Updated on

Sign up for ValueWalk’s free newsletter here.


Do you know someone who would benefit from this information? We can send your friend a strictly confidential, one-time email telling them about this information. Your privacy and your friend's privacy is your business... no spam! Click here and tell a friend!





You must be logged in to make a comment.
You can sign up for a membership or get a FREE Daily News membership or log in

Sign up today for an exclusive discount along with our 30-day GUARANTEE — Love us or leave, with your money back! Click here to become a part of our growing community and learn how to stop gambling with your investments. We will teach you to BE THE HOUSE — Not the Gambler!

Click here to see some testimonials from our members!