<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

New Two-Stage Malware Duo Targets Crypto Wallets and Browser Data

Discover how LeakyInjector and LeakyStealer malware target crypto wallets and browsers on Windows, bypassing security with advanced techniques.
Content Team

Cybersecurity researchers have discovered LeakyInjector and LeakyStealer, a dangerous malware pair that specifically targets cryptocurrency wallets and browser information on Windows computers.

The attack starts with LeakyInjector quietly installing LeakyStealer into the explorer.exe process using advanced injection techniques that bypass security software. LeakyStealer then hunts for popular crypto wallets including Electrum, Exodus, MetaMask, and Coinbase Wallet, while also stealing browser history from Chrome, Edge, Brave, Opera, and Vivaldi.

Both malware components use valid digital certificates to appear legitimate and employ a "polymorphic engine" that modifies memory to evade detection. The malware establishes persistence by disguising itself as "MicrosoftEdgeUpdateCore.exe" and survives system restarts.

Users should update security software, avoid untrusted downloads, and consider hardware wallets for crypto storage.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo