Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The botnet attacking Electrum has grown to 152,000 infected computers and has now stolen $4.6 million in cryptocurrencies such as Bitcoin, according to Malwarebytes.
Malwarebytes states that it has been âclosely monitoringâ the attack against the Electrum Bitcoin wallet.
The company states how the botnet came to fruition, stating:
âVictims were being tricked to download a fraudulent update that stole their cryptocurrencies,â explained Malwarebytes.
Later on, the threat actors launched a Distributed Denial of Service (DDoS) attacks in response to Electrum developers trying to protect their users.
As Bitcoinist first reported on the botnet in December last year, the amount stolen stood at USD $900,000. The phishing attemptâs first iteration came as a âsecurity updateâ but would later evolve as the scam became more complex.
The security update window below is caused by the trojan which is part of the botnet.
The botnet attacking Electrum is growing
âOn April 24th, the number of infected computers was below 100,000. Then the day after, âthe number of infected computers would peak at 152,000, wrote Malwarebytes.Â
The botnetâs size can be tracked with this online tool here.
New botnet âloaderâ identified
Malwarebytes adds that a second botnet loader has been identified as âTrojan.BeamWinHTTPâ that downloads the trojan âtransactionservices.exeâ â which is the main infected file that seeds the botnet.
The first loader was detected as âElectrumDosMiner.â
Visualizations of the scale of the botnets was also provided by Malwarebytes.
The second picture below shows the depth of the botnets architecture as well as its complexity.
Attacks since late December 2018
In a detailed blog post, on the subject, Malwarebytes claims that the attacks have occurred against the network since 2018 before rising sharply in 2019.
As retaliation for attempting to fix the companyâs own software, the criminals launched a denial of service attack against Electrumâs servers. The attackers were also able to reverse an initial patch by the company by redirecting users to compromised machines that contained the malware.
Known as being a âlightweightâ wallet, Electrum was chosen for attack due to its simplified architecture, operating in a client/server configuration. It was this configuration that would eventually allow attackers to compromise the networkâs security.
Specifically, attackers took advantage of the fact that anyone could operate on the network as a public Electrum peer. Attackers then launched whatâs called a Sybil attack that introduces compromised nodes into the network. The result of such an attack was that hundreds of thousands of computers have been compromised through the false security update and other means shown at the start of this article.
Â
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.