A new Android malware, dubbed SpyAgent, discovered by security firm McAfee, is capable of stealing private keys stored in screenshots and images on a smartphone's memory.
Specifically, the malware uses optical character recognition (OCR) technology to scan and extract text from images stored on the device. OCR is a popular technology on many platforms, including desktop computers, capable of recognizing, copying and pasting text from images.
McAfee Labs said SpyAgent spreads through malicious links sent via text messages. The process begins when a user accidentally clicks on the link they receive.
The link takes users to a seemingly legitimate website and asks them to download an app that is advertised as safe. However, it is actually the SpyAgent malware, and installing the app will compromise the phone.
These malicious programs are reportedly disguised as banking apps, streaming services, or government agency apps. Once installed, the apps request access to contacts, messages, and local storage.
Currently, SpyAgent mainly targets Korean users and has been detected in over 280 different fraudulent apps.
Last August, a similar malware affecting the MacOS operating system, called “Cthulhu Stealer,” was discovered. Like SpyAgent, Cthulhu Stealer masquerades as legitimate software and steals personal information, including MetaMask passwords, IP addresses, and Cold Storage private keys.
In the same month, Microsoft also discovered a security vulnerability in the Google Chrome browser, which was allegedly exploited by a North Korean hacker group called Citrine Sleet.
The hacker group is believed to have created fake cryptocurrency exchanges and sent fraudulent job applications to users. Those who Watcher the process unwittingly installed malware, allowing the hackers to remotely control and steal their private keys.
Although the Chrome vulnerability has been patched, the increase in malware attacks has forced the US Federal Bureau of Investigation (FBI) to issue a warning about this North Korean hacker group.
Join Telegram: https://t.me/tapchibitcoinvn
Follow Twitter: https://twitter.com/tapchibtc_io
Follow Tiktok: https://www.tiktok.com/@tapchibitcoin
Stone Sanh
According to Cointelegraph





