• About
  • Advertise
  • Careers
  • Contact
Saturday, June 3, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security Malware

Cloud storage solution MEGA delivered Monero cryptocurrency malware.

by Cyber360 News
November 11, 2019
in Malware
0
Cloud storage solution MEGA delivered Monero cryptocurrency malware.
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

Cloud storage solution MEGA delivered Monero cryptocurrency malware.

21st-century technologies like blockchain are regarded as groundbreaking inventions. However, the security aspect of the new age digital systems has always been criticized for being lackluster and flawed. This concern is reinforced frequently as digital technologies are successfully compromised quite often. According to the latest reports, file-sharing cloud storage service MEGA established by Kim Dotcom, is the latest victim of hacking.

According to reports, MEGA was hacked due to a compromised Chrome browser extension. Hackers were able to successfully upload an infected version of Chrome extension v3.39.4 to Google Play Store. MEGA remained hacked for five hours and anyone who installed the extension during this time got the accounts hacked. It must be noted that MEGA Chrome extension is a tool that helps in improving the browser’s performance by decreasing the loading time of webpages and offers a safe and secure cloud storage service.

The affected services include famous cryptocurrency wallets like MyEtherWallet, decentralized assets exchange service IDEX, and MyMonero. Amongst the targeted services, Amazon, Google, and Microsoft are included. The number of accounts that got compromised due to the attack is yet unknown. However, it is clear that the extension can steal Monero cryptocurrency.

Confirmed that it also extracts private keys if you login to MyMonero and/or MyEtherWallet in a browser with the extension installed. https://t.co/fpVK11zZ9Z

— Ricccarod Andsaskiaspagni (@fluffypony) September 4, 2018

News about the hack attack started spreading like wildfire on Tuesday morning when affected individuals started posting on Reddit and Twitter about the hacking of MEGA through a malicious Chrome extension. This extension was downloaded millions of times all over the world. Some users stated that the malicious code allowed the extension to collect classified and sensitive private data from famous websites across the internet.

A warning was posted from the official Twitter account of Monero (XMR) in which XMR holders were asked to not use MEGA. In-depth analysis reveals that not only popular websites but crypto-related websites have also been targeted. As noted by renowned Monero developer, Ricardo Spagni, that Monero and Ethereum private keys may get stolen if they have stored crypto on either MyEtherWallet or MyMonero using the MEGA Chrome extension v3.39.4.

“Please note that if you visited any site or made use of another extension that sends plain-text credentials […] while the trojaned extension was active, consider that your credentials were compromised on these sites and/or applications,” warns MEGA in its official statement following the hack.

MEGA claims that the hacking has resulted from a hacked webstore account on Google. Somehow, a hacker logged in using the official Play Store account of Google and uploaded an update that contained crypto stealing malware. Upon getting installed, the “trojaned version of MEGA’s Chrome extension” asks for elevated permissions such as permission to read and change the data on websites that you visit.

It must be noted that original Chrome extension doesn’t ask for this permission. The company also claims that the stolen data was transmitted to a server located in Ukraine. Currently, the MEGA Chrome is unavailable for downloading on Google Chrome Webstore. When visited the webpage showed 404 error which means that the extension has been deleted by Google.

Cyber360 News

Cyber360 News

Next Post
Microsoft Lab Offers $300K For Working Azure Exploits

Microsoft Lab Offers $300K For Working Azure Exploits

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In