FraudHIGH

Crypto Scam ShieldGuard - Dismantled After Malware Discovery

IMInfosecurity Magazine
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a fake crypto security tool stole people's money and data.

Quick Summary

The ShieldGuard crypto scam has been dismantled after it was found to be a malicious browser extension. Users of major platforms like Binance and Coinbase were targeted, risking their sensitive data. Experts urge caution with browser extensions and offers of free tokens.

What Happened

A recent cryptocurrency scam, known as ShieldGuard, has been dismantled following the discovery of its malicious intent. Initially marketed as a security tool to protect crypto wallets, this Chrome extension was actually designed to harvest sensitive user data. Researchers from Okta Threat Intelligence uncovered the operation, revealing that it utilized social media promotions and a token airdrop incentive to lure users into downloading the extension.

Users were promised rewards for promoting the extension, which falsely claimed to detect suspicious transactions. However, the reality was far more sinister. Instead of providing security, ShieldGuard was built to extract valuable information from users interacting with major crypto platforms like Binance, Coinbase, and MetaMask.

Malware Capabilities Revealed

The malware embedded within ShieldGuard had several alarming capabilities. It was able to:

  • Harvest wallet addresses across all visited websites.
  • Capture full HTML content from crypto platforms after users logged in.
  • Track users persistently across sessions.
  • Execute remote code via a command-and-control (C2) server.

Moreover, the malware employed advanced techniques such as obfuscation and a custom JavaScript interpreter to bypass Chrome's security measures. This allowed attackers to deliver and execute code dynamically without triggering standard protections, making it particularly dangerous for unsuspecting users.

Evidence from the investigation suggested that the operators of ShieldGuard may be Russian-speaking, based on language indicators found in the code. Additionally, researchers identified connections to another campaign known as Radex, indicating a broader threat network. In response to this discovery, Okta collaborated with industry partners to take decisive action against the operation.

The takedown involved removing the extension from the Chrome Web Store, disabling associated domains, and blocking user sign-in functionality. These measures effectively severed the communication between infected browsers and the attackers' servers, significantly reducing the threat posed by ShieldGuard.

What You Should Do

For users concerned about their online security, it is essential to exercise caution when using browser extensions. Here are some recommendations:

  • Limit the use of plugins and verify their sources before installation.
  • Be wary of offers promising free tokens or rewards for promoting software.
  • Regularly check your crypto accounts for any unauthorized transactions.

By staying vigilant and informed, users can better protect themselves from similar scams in the future. The dismantling of ShieldGuard serves as a reminder of the importance of cybersecurity awareness in the rapidly evolving world of cryptocurrency.

🔒 Pro insight: The ShieldGuard operation highlights the ongoing threat of malicious browser extensions in the cryptocurrency space, necessitating enhanced user vigilance and security measures.

Original article from

IMInfosecurity Magazine
Read Full Article

Also covered by

SCSC Media

Takedown of ShieldGuard cryptocurrency scam detailed

Read Article

Related Pings

HIGHFraud

Device Code Phishing - Attacks Surge 37 Times in 2026

Device code phishing attacks have skyrocketed this year, with a 37x increase. Users of IoT and streaming devices are particularly at risk. New phishing kits like EvilTokens are making these attacks easier for cybercriminals. Stay alert and protect your accounts.

BleepingComputer·
HIGHFraud

Job Scams - Coca-Cola and Ferrari Offers Are Traps

Scammers are impersonating Coca-Cola and Ferrari with fake job offers to steal your passwords. Job seekers are at high risk as these scams become more sophisticated. Protect your personal information by verifying job offers directly with companies.

Malwarebytes Labs·
HIGHFraud

FCC Proposes $4.5 Million Fine for Voxbeam's Fraudulent Calls

The FCC is proposing a hefty fine against Voxbeam for allowing fraudulent calls to reach American consumers. This could lead to stricter regulations on voice service providers. Stay alert to protect your personal information from scams.

The Record·
HIGHFraud

Windows Extortion Plot - Engineer Pleads Guilty to Charges

A former engineer has pleaded guilty to locking Windows admins out of servers in an extortion scheme. This incident underscores the risks of insider threats. Rhyne's actions could lead to a 15-year prison sentence. Companies must strengthen their cybersecurity measures to prevent similar attacks.

BleepingComputer·
MEDIUMFraud

Business Email Compromise - The New Threat Landscape Explained

A recent fraud attempt shows how business email compromise is evolving. Small organizations are now prime targets for these scams. Awareness is key to staying safe.

Cisco Talos Intelligence·
HIGHFraud

Vacant Homes - Adversaries Exploit Mail for Fraud

Criminals are exploiting vacant homes to intercept mail and commit fraud. This method targets sensitive information, leading to identity theft. Stay vigilant and monitor your mail to protect yourself.

BleepingComputer·