Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
This Trader Reportedly Lost $800k in Crypto Through Malicious Chrome Extensions

This Trader Reportedly Lost $800k in Crypto Through Malicious Chrome Extensions

CryptopotatoCryptopotato2024/04/08 19:01
By:Wayne JonesMore posts by this author

The trader verified that the compromise in their Google Chrome browser involved a keylogger targeting specific crypto wallet extensions.

An anonymous cryptocurrency investor with the username “Sell When Over” on X has reported a loss of $800,000 due to two allegedly malicious Google Chrome browser extensions.

The investor first raised the alarm with a post on X, revealing that they had discovered a loss of $500,000 from multiple wallet applications.

Chrome Extension Attack Leads to $800k Loss

“Think I got extension attacked, with two suspicious extensions that appeared on my Chrome browser,” they disclosed. Further investigation by the victim uncovered the extent of the compromise, amounting to a loss of $800,000. They suspected a compromise in their Google Chrome browser, potentially involving a keylogger targeting specific crypto wallet extensions.

Total compromise appears to be about $800k. I suspect this was a Google chrome compromise containing a possible keylogger targeting specific wallet extension apps (either due to a Chrome vulnerability due to me delaying regular updates or getting malware that wasn’t detected by… pic.twitter.com/yMJfHAFzQo

— Sell When Over | 9000.sei (@sell9000) April 8, 2024

Several weeks prior, the trader repeatedly postponed an update for Google Chrome. However, a mandatory Windows update eventually forced a system restart. Upon relaunching Chrome, they noticed that all their tabs had disappeared and extension logins had been reset.

Following the incident, the victim was forced to re-enter all their credentials on Chrome and manually reimport seed phrases for their cryptocurrency wallets from a separate secure device.

The user suspects that the keylogger compromised their sensitive information, leading to funds being drained afterward. The user also did not observe any abnormal behavior in their browser following the restart, with their virus scanner indicating no issues and no other suspicious extensions.

Chrome Extensions Identified as Keyloggers

After the preliminary investigation, they identified two suspicious extensions – “Sync test beta” and “Simple Game” and an auto Korean translation setting enabled in Chrome.

The user remained unsure how exactly their Chrome browser was compromised but confirmed that the “Sync test BETA” extension was a keylogger. Meanwhile, “Simple Game” appeared to monitor tab activities and communicate with an external site’s PHP script.

“This is an $800k costly mistake – lesson is if anything seems off such that it prompts you to input a seed, then wipe the whole PC first,” the trader cautioned.

They also explained that their guard had been down because the update coincided with a major Chrome update, which included changes to the user selection process and the sign-in interface with Google. This led them to think that the reset of extensions and the loss of tabs were due to this significant update.

As of the latest update, the attackers have reportedly transferred the funds to two exchanges: MEXC, located in Singapore, and Gate.io, headquartered in the Cayman Islands.

You Might Also Like:

  • Here's Why the Shido Token Crashed 94% Despite the Ongoing Market Rally
  • This NFT Platform Lost $290M in a 4-Day Exploit
  • This Blockchain Game Was Exploited for $4.6 Million Right Before its Launch
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!