Crypto-Stealing Malware Sidon Through Fake AI and Web3 Startups

Cybersecurity researchers dey warn say campaign wey dey steal crypto malware don increase wey dem dey pretend be AI and Web3 startups for social platform dem like X, Telegram and Discord. Attackers dey deploy crypto-stealing malware by make users download bad app wey dem hide as blockchain games or AI beta through fake websites, GitHub repos and white papers. Dem dey use professional looking front like stolen certificates, fake investor list and merchandise sites to make dem dey believable. For Windows, bad Electron-based apps dey profile systems and put hidden modules; for macOS, disguised DMG installers dey drop Atomic Stealer so e fit collect browser data, wallet details and seed phrases. Realst and Atomic Stealer families dey send stolen keys go servers wey attackers control. Campaigns dey target wallets wey relate to past breaches like Mt. Gox hack and dem dey use similar moves wey CrazyEvil and Traffer Group use. Mobile threats like SparkKitty dey use OCR to collect seed phrases from screenshots, while trojans like Procolored dey change wallet addresses to steal BTC. With crypto attacks dey rise — CertiK talk say $2.2bn loss for first half of 2025 and Kaspersky say crypto phishing jump 83% — traders suppose confirm software source, update security tools and use strong wallet protection to reduce risk.
Neutral
Di increase for crypto-stealing malware dey bring higher security risks but dem no dey affect cryptocurrency prices directly. Short term, traders fit spend more money on security and tighten risk management, with no immediate effect on BTC or other token prices. Long term, better defenses fit make market confidence strong but e no go likely cause big price changes. Overall, the news be neutral for price action.