Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Poisonseed abuses CRM accounts to launch cryptocurrency seedphrase addiction attacks
Identity

Poisonseed abuses CRM accounts to launch cryptocurrency seedphrase addiction attacks

userBy userApril 7, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 7, 2025Ravi LakshmananCloud Security/Cryptocurrency

A malicious campaign called Poisonseed leverages compromised credentials associated with customer relationship management (CRM) tools and bulk email providers to send spam messages containing cryptocurrency seed phrases to emit victims’ digital wallets.

“Bulk Spam recipients are being targeted in cryptocurrency seedphrase addiction attacks,” Silent Push said in the analysis. “As part of the attack, Poisonseed will provide security seed phrases to potential victims to copy and paste into new cryptocurrency wallets for future compromises.”

Poisonseed’s targets include corporate organizations and individuals outside the cryptocurrency industry. Crypto companies like Coinbase and Ledger, and bulk mail providers like MailChimp, Sendgrid, Hubspot, Mailgun and Zoho are among the targeted crypto companies.

Cybersecurity

This activity is rated different from two loosely aligned threat actor scattered spiders and cryptochameleons, which are part of a broader cybercrime ecosystem called COM. Several aspects of the campaign were previously disclosed last month by security researchers Troy Hunt and Bleeding Computers.

The attack includes threat actors who set up phishing pages that look like the prominent CRM and bulk mail companies, aiming to trick high-value targets into providing credentials. Once the credentials are obtained, the enemy will create an API key to ensure persistence even if the stolen password is reset by the owner.

In the next stage, operators may export mailing lists and use automated tools to send spam from these compromised accounts. Post-CRM Conpromies Supply Chain Spam Messages notifies users that they need to set up a new Coinbase wallet using seed phrases embedded in email.

The ultimate goal of the attack is to hijack your account using the same recovery phrase and transfer funds from those wallets. The links to scattered spiders and cryptochameleons are attributed to domain use (“Mailchimp-sso”[.]com”) It is not only previously identified as using the former, but also historical targeting of Cryptochameleon’s Coinbase and Ledger.

That said, the phishing kits used by Poisonseed do not share similarities with those used by the other two threat clusters, increasing the likelihood that they are either brand new Cryptochameleon phishing kits or another threat actor using similar commercials.

Cybersecurity

The development delivers malware that allows remote control of infected Windows hosts as Russian-speaking threat actors have been observed using phishing pages hosted on CloudFlare Pages.dev and Workers.dev. It turns out that previous iterations of the campaign also distributed StealC Information Steelers.

“This recent campaign is leveraging takedown notifications offered across multiple domains for CloudFlare branded phishing pages based on the Digital Millennium Copyright Act (DMCA),” Hunt.io said.

“The lure abuses the MS-Search protocol to download a malicious LNK file disguised as a PDF via a dual extension. After execution, the malware checks in on an attacker-controlled telegram and bots the victim’s IP address before moving to pyramid C2 to control the infected host.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDo you want to be younger? Peter Diamandis says he will survive for the next 10 years
Next Article Runners compete when Pyongyang Marathon returns from Covid pause | Gallery News
user
  • Website

Related Posts

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

July 17, 2025

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

July 17, 2025

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.