Hackers and cybercriminals have created and published a phishing website that emulates the new crypto wallet of Microsoft Crypto Wallet, in order to spread Luca Stealer, a dangerous malware. The spread of the news regarding the wallet linked to the Edge browser, with the cybercriminals who have created a likely site to spread the malicious agent.
Once on the site, the user is offered an alleged beta version of the Microsoft wallet, but receives nothing but the infostealer. The malware masquerading as Microsoft Crypto Wallet has several strengths. Chief among them is, of course, the sheer number of browsers it can compromise.
It is effective with various extensions and with several of the most common wallets currently on the market. Be wary of suspicious websites, as well as downloads from unofficial sources. Updating software and operating system, although it may take time, is another way to avoid Luca Stealer and other similar malicious agents.
Reliable antivirus software is, of course, an additional obstacle for malware and other cybercriminal initiatives. Finally, the need to constantly inform yourself about the evolution of the Web and related threats should not be underestimated.
This is open source malware, with code discoverable on platforms such as GitHub and TOR. This is a relatively new piece of software written entirely in the Rust language. Its job is to collect valuable data such as details of crypto wallet and other personal information of victims.
Malware is not necessarily created to cause tangible damage to a computer or computer system, but it should also be understood as a program that can secretly steal various types of information, from commercial to private, without being detected by the user even for long periods of time.
I In addition to secretly stealing information, malware can be created with the intention of causing damage to a computer system, often through sabotage, or it can encrypt the victim's computer data, extorting money for decryption.
Malware is a generic term referring to various types of intrusive or malicious software, including Computer Viruses, Worms, Trojans, Ransomware, Spyware, Adware, Scareware, and other malicious programs. It can take many forms, such as Executable Code, Scripts, and other software. Malware mainly spreads by inserting itself into non-malicious files.