Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Anonymous cryptocurrency investor loses $800,000 to malicious Google Chrome plugin

Anonymous cryptocurrency investor loses $800,000 to malicious Google Chrome plugin

2024/04/08 19:23

An anonymous cryptocurrency investor using the username "Sell When Over" on Platform X has lost $800,000 to two allegedly malicious Google Chrome extensions. The investor first posted a warning on Platform X that they had lost $500,000 to multiple wallet apps. They suspected that Google Chrome was compromised, possibly involving keyloggers targeting specific crypto wallet extensions. A few weeks ago, the trader delayed a Google Chrome update several times. However, a mandatory Windows update eventually forced a system reboot. Upon restarting Chrome, they found that all tabs had disappeared and the extension's login information had been reset. Thereafter, the victims were forced to re-enter all their credentials on Chrome and manually re-import the seed phrase for their cryptocurrency wallet from another secure device. Users suspected that the keylogger had compromised their sensitive information, leading to the emptying of funds. After an initial investigation, they discovered two suspicious extensions - "Sync test beta" and "Simple Game" - as well as an automatic Korean translation setting enabled in Chrome. Users are still unsure how their Chrome browser was compromised, but confirmed that the "Sync test BETA" extension is a keylogger. Meanwhile, "Simple Game" seems to be monitoring tab activity and communicating with PHP scripts on external websites.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!