Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware
Identity

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

userBy userJuly 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 20, 2025Ravi LakshmananAI Security / Infostealers

EncryptThub targets Web3 developers

The financially motivated threat actor known as Encrypthub (aka Larva-208 and Water Gamayun) is attributed to a new campaign aimed at Web3 developers getting infected with information Stealer malware.

“Larva-208 uses fake AI platforms (such as Norlax AI, TeamPilot imitations) to evolve tactics and invite victims with job postings or portfolio review requests.”

The group has a history of ransomware deployment, but the latest findings show the evolution of its tactics and diversifying how it monetizes by using Stealer malware to collect data from cryptocurrency wallets.

The focus of Encrypthub, which focuses on Web3 developers, is not random. These individuals often manage crypto wallets, access to smart contract repository, or sensitive testing environments. Many operate as freelancers or work on multiple decentralized projects, making it difficult to protect with traditional enterprise security controls. This decentralized, high-value developer community provides an ideal target for attackers who are looking to monetize quickly without triggering centralized defenses.

The attack chain must direct potential targets to the deceptive artificial intelligence (AI) platform and direct them to click on aggregation links within these sites.

Cybersecurity

Meeting links to these sites are sent to developers who follow Web3 and blockchain-related content via platforms such as X and Telegram, under the pretext of job interviews and portfolio discussions. It turns out that the threat actors are sending Meeting links to those who applied for positions they posted to the Web3 job board called Remote3.

What’s interesting is the approach that attackers use to avoid security warnings issued by Remote3 on their site. Given that the service explicitly warns job seekers against unfamiliar video conferencing software downloads, the attacker will have their first conversation through Google Meet, in the meantime, instructing the applicant to resume interviews with Norlax AI.

Regardless of the method used, when the victim clicks on the meeting link, he is asked to enter his email address and invitation code, and then he is provided with a fake error message about an outdated or missing audio driver.

Clicking on the message will lead to downloading malicious software disguised as a real RealTek HD audio driver. This will run the PowerShell command to get and expand Fickle Stealer. Information collected by the Stealer malware is sent to an external server codenamed SilentPrism.

“Threat actors can distribute whimsical infostealers through fake AI applications and successfully harvest cryptocurrency wallets, development qualifications, and sensitive project data,” Prodaft said.

“This latest operation suggests a shift towards alternative monetization strategies that include removal of valuable data and credentials for potential resale or exploitation in illegal markets.”

The development is an attempt to enrich visibility and reliability by following the style of the Akira ransomware group and a similar ransom note format as Qilin, as Trustwave SpiderLabs detailing a new ransomware stock called Kawa4096.

Kawa4096, which first appeared in June 2025, targets 11 companies, with the most targets in the US and Japan. The initial access vector used in the attack is unknown.

Notable features of Kawa4096 are the ability to encrypt files on a shared network drive and the ability to use multi-threaded to increase operational efficiency and speed up the scanning and encryption process.

“After identifying valid files, the ransomware adds them to the sharing queue,” said security researchers Nathaniel Morales and John Basmayor. “This queue is processed by a pool of worker threads responsible for getting the file path and passing it to the encryption routine. The semaphore is used for synchronization between threads to ensure efficient processing of the file queue.”

Cybersecurity

Another new entrant to the ransomware landscape is at the heart, claiming that this is part of the Blackbyte group, unfolding wildly in three incidents detected per huntress on July 4th and 13th, 2025.

In one incident, threat actors are known to leverage valid credentials via RDP to obtain scaffolding for the target network. All attacks have in common with legitimate Windows tools such as SVChost.exe and bcdedit.exe to modify the boot configuration to hide malicious commands and block system recovery.

“Threat actors also clearly prefer legitimate processes such as BCDEDIT.EXE and svChost.exe, so continuing monitoring of suspicious behavior using these processes via endpoint detection and response (EDR) helps to attack environmental threat actors,” Huntress said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIceman and his neighbor Ötzi had completely different ancestors, and ancient DNA studies have discovered
Next Article Why Kurtken focused on industrial robots from last mile delivery
user
  • Website

Related Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

September 10, 2025

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

September 10, 2025

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

September 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

Vimeo is acquired by bending a spoon in a $1.38 billion all-cash transaction

Chillyhell Macos backdoor and Zinorrat rats threaten Macos, Windows and Linux Systems

Microsoft fixes 80 defects – including SMB PrivesC and Azure CVSS 10.0 bugs

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.