","button_title":"Play-to-Earn Game List","span_one":"No obligations","span_two":"Free to use"}},"header":{"homepage":"Homepage","Game Reviews":"Game Reviews","Game List":"Game List","Developers":"Developers","Developer List":"Developer List","Gaming News":"Gaming News","search":"Search","local":"en","Popular P2E Developers":"Popular P2E Developers","Play To Earn Games":"Play To Earn Games","P2E Games":"P2E Games","Crypto Games":"Crypto Games","Web3 Games":"Web3 Games"},"meta":{"title":"Games to Earn, Blockchain, NFT, P2E Games List","description":"Play hundreds of games! Games to Earn, P2E, Blockchain, NFT, Crypto, Web3 Games. Read game reviews and start playing right away. Play now!","ogType":"article","keywords":"NFT Games, Crypto Games, Earning Games, Earning Games, Blockchain Games, P2E Games"}}},"initialLocale":"en","ns":["news_letter","singleNews","singleGame","footer","common","header","meta"],"userConfig":{"i18n":{"locales":["en","hi","fr","es","de","pt","nl","tr"],"localeDetection":false,"defaultLocale":"en","domains":[{"domain":"playtoearngames.com","defaultLocale":"en"},{"domain":"hi.playtoearngames.com","defaultLocale":"hi","locales":["hi-IN"]},{"domain":"fr.playtoearngames.com","defaultLocale":"fr","locales":["fr-BE","fr-CA"]},{"domain":"es.playtoearngames.com","defaultLocale":"es","locales":["es-GT","es-MX"]},{"domain":"pt.playtoearngames.com","defaultLocale":"pt","locales":["pt-BR"]},{"domain":"de.playtoearngames.com","defaultLocale":"de","locales":["de","de-DE","de-AT","de-CH"]},{"domain":"nl.playtoearngames.com","defaultLocale":"nl","locales":["nl-BE"]},{"domain":"tr.playtoearngames.com","defaultLocale":"tr"}]},"trailingSlash":true,"default":{"i18n":{"locales":["en","hi","fr","es","de","pt","nl","tr"],"localeDetection":false,"defaultLocale":"en","domains":[{"domain":"playtoearngames.com","defaultLocale":"en"},{"domain":"hi.playtoearngames.com","defaultLocale":"hi","locales":["hi-IN"]},{"domain":"fr.playtoearngames.com","defaultLocale":"fr","locales":["fr-BE","fr-CA"]},{"domain":"es.playtoearngames.com","defaultLocale":"es","locales":["es-GT","es-MX"]},{"domain":"pt.playtoearngames.com","defaultLocale":"pt","locales":["pt-BR"]},{"domain":"de.playtoearngames.com","defaultLocale":"de","locales":["de","de-DE","de-AT","de-CH"]},{"domain":"nl.playtoearngames.com","defaultLocale":"nl","locales":["nl-BE"]},{"domain":"tr.playtoearngames.com","defaultLocale":"tr"}]},"trailingSlash":true}}}}Guard Against Hackers Using Email Replies for Crypto Mining Malware - Play to Earn Games News
Cybersecurity researchers have recently uncovered a new method used by hackers to compromise systems and deploy stealthy crypto mining malware. According to a report by the threat intelligence firm Facct, attackers are leveraging automated email replies from compromised accounts to target organizations in Russia, including companies, marketplaces, and financial institutions.
The goal of these cybercriminals is to install the XMRig miner on victims’ devices, allowing them to mine digital assets covertly without the knowledge of the device owners.
150 Emails Containing XMRig Miner Identified
Facct's investigation has revealed that since late May, approximately 150 emails containing the XMRig miner have been identified. Fortunately, the firm's business email protection system successfully blocked these malicious emails before they could reach their intended targets.
Dmitry Eremenko, a senior analyst at Facct, emphasized the unique danger posed by this attack vector, highlighting the potential risks associated with such a method of infiltration.
Unlike traditional phishing campaigns where recipients can easily disregard suspicious emails, this tactic preys on the expectations of the recipients. Since the victims are initiating the communication by sending an email first, they are more likely to trust the subsequent auto-reply they receive, unknowingly engaging with compromised accounts.
"In this scenario, even if the email doesn’t appear convincing, the established communication chain may reduce suspicion, making the recipient more likely to engage with the malicious attachment," said Eremenko.
To combat such threats, Facct advises organizations to bolster their cybersecurity measures by providing regular training to employees on current threats and best practices. They also recommend implementing strong password policies and multi-factor authentication to enhance security against potential attacks.
This incident is not the first time hackers have utilized XMRig in their operations. The open-source application, designed for mining the Monero cryptocurrency, has been frequently integrated into malicious campaigns since 2020.
In previous instances, XMRig was used in conjunction with malware such as “Lucifer” and the “FritzFrog” botnet to target vulnerable systems and exploit outdated software vulnerabilities.
North Korean Hackers Use Malware to Steal crypto Keys
In a separate development, the FBI recently issued a warning about a sophisticated Android malware called SpyAgent, discovered by McAfee. This malicious software is designed to target cryptocurrency private keys stored on smartphones, utilizing optical character recognition (OCR) technology to extract text from images and screenshots on the device.
SpyAgent is distributed through malicious links sent via text messages and poses a significant risk to users' crypto assets by targeting their private keys.
Additionally, another malware threat known as the “Cthulhu Stealer” has been identified, affecting MacOS systems. This malware disguises itself as legitimate software and targets sensitive information, including MetaMask passwords, IP addresses, and cold wallet private keys.
Furthermore, Microsoft recently uncovered a vulnerability in Google Chrome that was exploited by the North Korean hacker group Citrine Sleet. The group used the vulnerability to create fake cryptocurrency exchanges and fraudulent job applications, further highlighting the persistent threat posed by cybercriminals in the digital landscape.
As the frequency of crypto-related scams continues to rise, it is essential for individuals and organizations to remain vigilant and implement robust security measures to safeguard their assets and information from malicious actors.