{"id":64326,"date":"2023-11-13T07:35:33","date_gmt":"2023-11-13T11:35:33","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=64326"},"modified":"2023-11-13T07:35:53","modified_gmt":"2023-11-13T11:35:53","slug":"chinese-hackers-use-fake-skype-app-in-new-crypto-phishing-scam","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/chinese-hackers-use-fake-skype-app-in-new-crypto-phishing-scam\/","title":{"rendered":"Chinese Hackers Use Fake Skype App in New Crypto Phishing Scam"},"content":{"rendered":"\n<p>In China, crypto security firm SlowMist has discovered several <a href=\"https:\/\/coinscreed.com\/staging\/defi-platform-oasis-will-block-wallet-addresses-deemed-vulnerable.html\" target=\"_blank\" rel=\"noreferrer noopener\">wallet addresses<\/a> linked to a phishing scam defrauding unsuspecting crypto users through a fake Skype app.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-1024x569.png\" alt=\"Chinese Hackers Use Fake Skype App in New Crypto Phishing Scam\" class=\"wp-image-64334\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-1024x569.png 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-300x167.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-768x427.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-18x10.png 18w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-750x417.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46-1140x634.png 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46.png 1286w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Chinese Hackers Use Fake Skype App in New Crypto Phishing Scam<\/figcaption><\/figure>\n\n\n\n<p>A new phishing scheme has emerged in China that targets cryptocurrency users with a fake Skype video app.<\/p>\n\n\n\n<p>The Chinese hackers responsible for the <a href=\"https:\/\/coinscreed.com\/staging\/frentechpro-phishing-scam-steals-214000-across-blockchains.html\" target=\"_blank\" rel=\"noreferrer noopener\">phishing scam<\/a>, according to a report by the crypto security analytic firm SlowMist, utilized China's ban on international applications as the foundation of their scheme since several mainland users frequently use third-party platforms to search for these banned applications to obtain hundreds of thousands of dollars.<\/p>\n\n\n\n<p>Scammers frequently exploit this vulnerability to compromise mainland users' cryptocurrency wallets with cloned, counterfeit social media applications, including Telegram, WhatsApp, and Skype, among mainland users' most frequently sought-after applications.<\/p>\n\n\n\n<figure class=\"wp-block-image size-jnews-featured-750\"><img decoding=\"async\" width=\"750\" height=\"736\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-750x736.png\" alt=\"\" class=\"wp-image-64328\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-750x736.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-300x294.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-768x753.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-12x12.png 12w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44-75x75.png 75w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-44.png 840w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\">Baidu search results for Skype. Source: Baidu<\/figcaption><\/figure>\n\n\n\n<p>The latest version of Skype, according to the findings of the <a href=\"https:\/\/www.slowmist.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">SlowMist<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> team, was 8.107.0.215, whereas the recently created phony Skype application bore the version number 8.87.0.403. <\/p>\n\n\n\n<p>According to the team's findings, the phishing backend domain &#8216;bn-download3.com' impersonated the Binance exchange on November 23, 2022, and subsequently altered its guise to Skype on May 23, 2023. A user first reported the fake Skype application, stating they had &#8220;substantially lost money&#8221; to the same fraud.<\/p>\n\n\n\n<p>The decompilation of the rogue application unveiled that it had inserted malware by tampering with its signature. Furthermore, the investigation revealed that the application had altered okhttp3, a widely used Android network framework, to target cryptocurrency users. <\/p>\n\n\n\n<p>While the default okhttp3 framework manages traffic requests on <a href=\"https:\/\/coinscreed.com\/staging\/google-introduces-ai-to-android-google-assistant.html\" target=\"_blank\" rel=\"noreferrer noopener\">Android devices<\/a>, the modified okhttp3 acquires images from multiple directories and continuously scans for newly uploaded images.<\/p>\n\n\n\n<p>Although most social media applications request these permissions regardless, users frequently fail to suspect any wrongdoing when the malicious okhttp3 requests access to internal files and images. <\/p>\n\n\n\n<p>As a result, the sham Skype commences uploading images, device information, user ID, phone number, and additional data to the backend immediately.<\/p>\n\n\n\n<p>After gaining access, the rogue application persistently scans for messages and images that contain address formats resembling TRX and ETH. Upon detection, phishing syndicates substitute these addresses automatically with pre-established malevolent addresses.<\/p>\n\n\n\n<figure class=\"wp-block-image size-jnews-featured-750\"><img decoding=\"async\" width=\"750\" height=\"705\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45-750x705.png\" alt=\"\" class=\"wp-image-64330\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45-750x705.png 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45-300x282.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45-768x722.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45-13x12.png 13w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-45.png 892w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><figcaption class=\"wp-element-caption\">Fake Skype app backend. Source: Slowmist<\/figcaption><\/figure>\n\n\n\n<p>Wallet address replacement had ceased, and the fraud interface's back end had been deactivated and was no longer returning malicious addresses, according to SlowMist testing.<\/p>\n\n\n\n<p>Additionally, the group ascertained that a TRON chain address (TJhqKzGQ3LzT9ih53JoyAvMnnH5EThWLQB) was the recipient of an estimated 192,856 USDT throughout 110 transactions through November 8. Simultaneously, an additional ETH chain address (0xF90acFBe580F58f912F557B444bA1bf77053fc03) encountered 10 deposit transactions totaling around 7,800 <a href=\"https:\/\/coinscreed.com\/staging\/tether-mints-4b-usdt-in-4-weeks-whale-alert.html\" target=\"_blank\" rel=\"noreferrer noopener\">USDT<\/a>.<\/p>\n\n\n\n<p>All wallet addresses associated with the fraud were named and blocked by the SlowMist team.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In China, crypto security firm SlowMist has discovered several wallet addresses linked to a phishing scam defrauding unsuspecting crypto users through a fake Skype app. A new phishing scheme has emerged in China that targets cryptocurrency users with a fake Skype video app. The Chinese hackers responsible for the phishing scam, according to a report [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":64334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[322,17172,937,17173],"class_list":["post-64326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-china","tag-crypto-phishing-scam","tag-hackers","tag-skype-app"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/11\/image-46.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/64326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=64326"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/64326\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/64334"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=64326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=64326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=64326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}