{"id":23443,"date":"2025-04-26T07:00:00","date_gmt":"2025-04-26T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/crypto-theft-via-games-telegram-blocks-impact-and-other-cybersecurity-developments\/"},"modified":"2025-04-26T07:00:00","modified_gmt":"2025-04-26T04:00:00","slug":"crypto-theft-via-games-telegram-blocks-impact-and-other-cybersecurity-developments","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/crypto-theft-via-games-telegram-blocks-impact-and-other-cybersecurity-developments\/","title":{"rendered":"Crypto theft via games, Telegram blocks\u2019 impact, and other cybersecurity developments"},"content":{"rendered":"<p>We round up the week&#8217;s key cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>&#8220;Test&#8221; video games spread crypto-stealing malware.<\/li>\n<li>Russians warned about an app that clones bank cards.<\/li>\n<li>Telegram blocks cut data leaks.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>Experts uncover another way to steal crypto via Zoom<\/strong><\/h2>\n<p>The director of cybersecurity firm Trail of Bits <a href=\"https:\/\/blog.trailofbits.com\/2025\/04\/17\/mitigating-elusive-comet-zoom-remote-control-attacks\/\">encountered<\/a> a Zoom-borne cyberattack after being invited to an interview with Bloomberg Crypto. The attackers contacted the target on social media and scheduled the call via Calendly links.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXe0Eqogmezpyjr-2p6uu17xB6Z78XJH5Iby4iKKwIP09Hi2T9eoIkjywTSpqLpVipjUjZ2zSBs27nQ8EgNNcfJB6do8GfPApZ-ELMfUIZCAzJXiksUNtotf4wlM-Pn6Ym86Zhnjjw?key=H9NjcvkvDmvNnL3sFfSfvSHq\" alt=\"Crypto theft via games, Telegram blocks\u2019 impact, and other cybersecurity developments\"\/><figcaption class=\"wp-element-caption\">Calendly page used to schedule the interview. Data: Trail of Bits.<\/figcaption><\/figure>\n<p>During the call, the hackers initiated screen sharing and sent a request for remote control. At that moment, the caller changed their display name to &#8220;Zoom&#8221;, making the prompt look legitimate to the victim: &#8220;Zoom is requesting remote control of your screen&#8221;.<\/p>\n<p>If approved, the attacker gains full remote control of the system, enabling theft of confidential data, installation of malware and initiation of crypto transactions.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Russians warned about a card-cloning app<\/strong><\/h2>\n<p>Company F6 <a href=\"https:\/\/www.f6.ru\/media-center\/press-releases\/reverse-nfcgate\/\">discovered<\/a> a new malicious build of the legitimate NFCGate app for attacks on bank customers. It is tailored for fraudulent call centres.<\/p>\n<p>Instead of intercepting NFC data from a user&#8217;s card, the attackers create a clone of their own card on the victim&#8217;s device. They then, under various pretexts, direct the victim to an ATM to deposit money supposedly to themselves. In fact, all transfers go to the scammers.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXdF2XxnXlrooOdDlsWBraxgYfkv8NMarvf1sJUfDiikyz9vaT272QcfKiwqNq82UMHd5HKDqu6HnPBJ1Z6NHGacalgYyZLbf4Wa1d8S0kHgbtwFLncFCBCxlRlUbrYJyEsA5JXKxg?key=H9NjcvkvDmvNnL3sFfSfvSHq\" alt=\"Crypto theft via games, Telegram blocks\u2019 impact, and other cybersecurity developments\"\/><figcaption class=\"wp-element-caption\">Fraud scheme. Data: F6.<\/figcaption><\/figure>\n<p>Losses of Russian bank customers from all malicious versions of NFCGate in Q1 2025 totalled 432m rubles. The average loss from the new version in March is estimated at 100,000 rubles.<\/p>\n<h2 class=\"wp-block-heading\"><strong>&#8220;Test&#8221; video games spread crypto-stealers<\/strong><\/h2>\n<p>&#8220;Test&#8221; video games have appeared on popular gaming platforms, used by cybercriminals to steal users&#8217; confidential information, <a href=\"https:\/\/flashpoint.io\/blog\/ageostealer-how-social-engineering-targets-gamers\/\">noted<\/a> Flashpoint.<\/p>\n<p>After the victim downloads an archive, the AgeoStealer malware lands on the computer. It scans Chrome, Firefox, Microsoft Edge and Opera for stored credentials, authentication tokens and browsing history.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXf6JiJ7FC8poly5ruKff1sDPVNsl68VMyHH9Msj4wTA-pTJTtAHiVIzBGAcTfTLOD8kN-ubArKb7mNGhyTc6ZPZuXd_BJm1fkO7jfsyUaK4TgER84OABPU-L_ngj7WJ--mzuK8uHg?key=H9NjcvkvDmvNnL3sFfSfvSHq\" alt=\"Crypto theft via games, Telegram blocks\u2019 impact, and other cybersecurity developments\"\/><figcaption class=\"wp-element-caption\">A Blogspot page delivering an archive containing AgeoStealer. Data: Flashpoint.<\/figcaption><\/figure>\n<p>The stealer prioritises logins and passwords, cookies and cryptocurrency wallet data.<\/p>\n<p>AgeoStealer can mask its activity and evade detection by traditional antivirus tools for prolonged periods.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Telegram blocks reduced the number of leaks<\/strong><\/h2>\n<p>In the first quarter of 2025, F6 specialists <a href=\"https:\/\/t.me\/f6_cybersecurity\/3631\">recorded<\/a> 67 cases of publishing databases of Russian companies, 29% fewer than in the same period last year (95 leaks).<\/p>\n<p>Experts linked the decline to active blocking of closed Telegram chats where stolen information was distributed.<\/p>\n<p>More than 46% of all public leaks in 2025 fall on retail and online stores, 13% on the public sector. IT companies, internet services, telecoms and educational portals are also at risk.<\/p>\n<p>Roughly 99.7m rows ended up in open access, including full names, home addresses, passwords, dates of birth, passport data and phone numbers.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Americans asked to help catch hackers<\/strong><\/h2>\n<p>The FBI <a href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250424-2\">requested<\/a> information from the public about Chinese hackers Salt Typhoon, behind large-scale breaches of telecommunications providers&#8217; networks in the US and worldwide. Their activity led to theft of call detail records and a limited number of private messages.<\/p>\n<p>Authorities are interested in any information that could help identify and locate the cybercriminals.<\/p>\n<p>Separately, the State Department offers a reward of up to $10m for information on foreign hackers involved in malicious activity against US critical infrastructure.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Scammers built an &#8220;AI-based investment project&#8221; in WhatsApp&#8217;s name<\/strong><\/h2>\n<p>The phishing site WhatsApp AI dupes users by promising monthly earnings from \u20ac14,000, experts at Solar AURA told ForkLog.<\/p>\n<p>The platform is promoted as &#8220;a new solution for automated stock trading via the popular messenger&#8221;. Clients are enticed with minimal investments \u2014 it is enough to leave personal data and deposit funds for access to the system.<\/p>\n<p>After payment, the money stays with the scammers, and the victim receives no profit.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>The Zora team was <a href=\"https:\/\/u1f987.com\/en\/news\/zora-team-accused-of-token-sales-prior-to-airdrop\">suspected of selling tokens<\/a> ahead of the airdrop.<\/li>\n<li>CloneX NFT avatars <a href=\"https:\/\/u1f987.com\/en\/news\/clonex-nft-avatars-reappear-after-temporary-disappearance\">returned<\/a> after &#8220;disappearing&#8221;.<\/li>\n<li>Hackers from North Korea created <a href=\"https:\/\/u1f987.com\/en\/news\/north-korean-hackers-establish-fake-firms-to-deceive-users\">shell companies<\/a> to deceive users.<\/li>\n<li>Tether <a href=\"https:\/\/u1f987.com\/en\/news\/tether-freezes-28-7-million-usdt-across-13-addresses\">froze 28.7m USDT<\/a> across 13 addresses.<\/li>\n<li>Crypto scammers <a href=\"https:\/\/u1f987.com\/en\/news\/elderly-americans-lose-2-8-billion-to-crypto-scams-in-2024\">stole<\/a> $2.8bn from elderly Americans in 2024.<\/li>\n<li>ZKsync <a href=\"https:\/\/u1f987.com\/en\/news\/zksync-reaches-agreement-with-hacker-for-return-of-5-million\">reached a deal with a hacker<\/a> to return $5m.<\/li>\n<li>In NABU&#8217;s bitcoin declarations, <a href=\"https:\/\/u1f987.com\/en\/news\/inaccuracies-found-in-bitcoin-declarations-of-ukraines-anti-corruption-bureau\">inaccurate data<\/a> were found.<\/li>\n<li>Operators of crypto-theft malware have begun <a href=\"https:\/\/u1f987.com\/en\/news\/cryptocurrency-theft-software-operators-turn-to-rental-model\">renting out tools<\/a>.<\/li>\n<li>The SEC accused PGI Global&#8217;s CEO of <a href=\"https:\/\/u1f987.com\/en\/news\/sec-accuses-pgi-global-ceo-of-198-million-cryptocurrency-fraud\">crypto fraud<\/a> worth $198m.<\/li>\n<li>Unicoin <a href=\"https:\/\/u1f987.com\/en\/news\/unicoin-rejects-secs-settlement-proposal\">rejected the SEC&#8217;s settlement offer<\/a>.<\/li>\n<li>A hacker <a href=\"https:\/\/u1f987.com\/en\/news\/hacker-targets-xrp-owners-via-javascript-library\">attacked XRP holders<\/a> via a JavaScript library.<\/li>\n<li>WazirX <a href=\"https:\/\/u1f987.com\/en\/news\/wazirx-to-resume-operations-following-235-million-hack\">will resume operations<\/a> after a $235m hack.<\/li>\n<li>The UN voiced concern about <a href=\"https:\/\/u1f987.com\/en\/news\/un-expresses-concern-over-money-laundering-via-cryptocurrency-mining\">money laundering<\/a> via mining.<\/li>\n<li>Binance&#8217;s founder received <a href=\"https:\/\/u1f987.com\/en\/news\/binance-founder-receives-90-million-fake-grok-tokens\">90m fake tokens<\/a> Grok.<\/li>\n<li>Durov <a href=\"https:\/\/u1f987.com\/en\/news\/durov-denies-sharing-telegram-users-private-messages-with-authorities\">denied handing over<\/a> private Telegram chats to authorities.<\/li>\n<li>Bitget will compensate <a href=\"https:\/\/u1f987.com\/en\/news\/bitget-to-compensate-losses-following-voxel-token-manipulation\">losses after manipulation<\/a> with the VOXEL token.<\/li>\n<li>In Kazakhstan, three pyramids had <a href=\"https:\/\/u1f987.com\/en\/news\/kazakhstan-seizes-3-8-million-usdt-from-three-crypto-pyramids\">3.8m USDT seized<\/a>.<\/li>\n<li>Bybit&#8217;s CEO: more than half of stolen assets <a href=\"https:\/\/u1f987.com\/en\/news\/bybit-ceo-over-half-of-stolen-assets-remain-traceable\">can be traced<\/a>.<\/li>\n<li>HashFlare&#8217;s founders were asked to <a href=\"https:\/\/u1f987.com\/en\/news\/hashflare-founders-ordered-to-leave-u-s-despite-court-ruling\">leave the US<\/a> despite a court order.<\/li>\n<li>BestChange reported <a href=\"https:\/\/u1f987.com\/en\/news\/bestchange-faces-another-block-in-russia\">another block<\/a> in Russia.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>What to read this weekend?<\/strong><\/h2>\n<p>The story of the founder of the OneCoin crypto pyramid scheme. How did Ruja Ignatova live, and where did she disappear to?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We round up the week&#8217;s key cybersecurity news. &#8220;Test&#8221; video games spread crypto-stealing malware. Russians warned about an app that clones bank cards. Telegram blocks cut data leaks. Experts uncover another way to steal crypto via Zoom The director of cybersecurity firm Trail of Bits encountered a Zoom-borne cyberattack after being invited to an interview [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-23443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"86","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/23443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=23443"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/23443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/23442"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=23443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=23443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=23443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}