🔥 Land A High Paying Web3 Job In 90 Days LEARN MORE

Microsoft Windows crypto malware targets wallet data

In this post:

A new Microsoft Windows crypto malware has been discovered by the Microsoft team and is known to target the crypto wallet. Virtual currency users on the Microsoft Windows platform have been cautioned regarding a fresh malware infecting Windows operating system.

Microsoft Security Intelligence mentioned about the latest Microsoft Windows crypto malware dubbed Anubis in its latest tweet. The team explained how crypto wallets installed on MS Windows OS face security threat and users must take steps to stay protected from this threat.

Microsoft Windows crypto malware named Anubis after its Android counterpart

The new MS crypto malware, Anubis, probably employs a Loki-related code. It gathers a user’s information stored from the wallet including credit card information, personal data, and other data stored in Windows files.

Despite the heavy security features deployed by most crypto firms, the unscrupulous elements are fast catching up to the crypto realm. Anubis malware was first detected in June 2020. Interestingly, another Trojan called Anubis infects Android smartphones.

See also  NFTs experienced their lowest performance year since 2020: DappRadar

MS Windows crypto users are no longer safe

Despite the immediate threat, MSI mentioned how Anubis Microsoft Windows crypto malware can be controlled easily. So far, the malware is observed in limited campaigns including C2 servers and related links.

Various websites are currently active in spreading Anubis onto MS user’s computers through illegal means or tricks. Once installed, the malware moves to grab the user information from the crypto wallets and then sends the same to other servers using an HTTP POST method.

MSI team has further stated that they will keep observing the malware. Until a solution comes, the team has warned MS Windows users not to download any spam email or attachment. The users must also refrain from clicking on any fishy email. Originally, the Loki code uses such tactics to defraud users into downloading email attachments to distribute their malware or viruses.

A Step-By-Step System To Launching Your Web3 Career and Landing High-Paying Crypto Jobs in 90 Days.

Share link:

Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Editor's choice

Loading Editor's Choice articles...
Subscribe to CryptoPolitan