The interface of Ambient Finance – a decentralized trading protocol – was hacked on October 17, and the team warned users not to interact with the site, connect wallets, or sign transactions during this time.
According to Ambient Finance, the site's domain was hacked, but the hacked site is an isolated incident. The team assured customers that Ambient's contracts and funds remain safe.
Shortly after the hack, Ambient Finance managed to recover the domain, but it is currently waiting for the DNS to be updated and distributed. Ambient representatives warned users to wait for "everything clear" to interact with the website again.
Security firm Blockaid said the hack used the infamous Inferno Drainer, a malware package designed to steal digital assets, and noted that the C2 server that launched the attack was set up 24 hours before the incident.
Respect Every Click: Malware Gets More Sophisticated.
Unfortunately, the Ambient Finance hack is not unique, and malware attacks are becoming more sophisticated. Developers have long believed that Apple's macOS is generally immune to malware.
Recently, however, there has been an increase in malware targeting macOS systems. In August 2024, cybersecurity companies discovered a new form of malware called the 'Cthulhu Stealer'.
The Cthulhu Stealer masquerades as a real macOS program that installs itself on the desktop and steals sensitive data and private keys, emptying cryptocurrency wallets in the process.
In September, McAfee Labs security specialists discovered malware targeting Android operating systems called SpyAgent. SpyAgent uses optical character recognition to scan images and steal sensitive information stored in images, including private key snapshots.
SpyAgent was distributed through links in text messages that initiated the download of seemingly harmless applications that were just disguised versions of malware. McAfee researchers have identified more than 280 rogue apps, all of which are associated with SpyAgent.
Cybersecurity firm Facct also recently discovered a unique malware distribution method that uses automated emails to install modified XMrig mining software. This modification of legitimate software allows attackers to mine cryptocurrency using the victims' compromised devices.
According to Ambient Finance, the site's domain was hacked, but the hacked site is an isolated incident. The team assured customers that Ambient's contracts and funds remain safe.
Shortly after the hack, Ambient Finance managed to recover the domain, but it is currently waiting for the DNS to be updated and distributed. Ambient representatives warned users to wait for "everything clear" to interact with the website again.
Security firm Blockaid said the hack used the infamous Inferno Drainer, a malware package designed to steal digital assets, and noted that the C2 server that launched the attack was set up 24 hours before the incident.
Respect Every Click: Malware Gets More Sophisticated.
Unfortunately, the Ambient Finance hack is not unique, and malware attacks are becoming more sophisticated. Developers have long believed that Apple's macOS is generally immune to malware.
Recently, however, there has been an increase in malware targeting macOS systems. In August 2024, cybersecurity companies discovered a new form of malware called the 'Cthulhu Stealer'.
The Cthulhu Stealer masquerades as a real macOS program that installs itself on the desktop and steals sensitive data and private keys, emptying cryptocurrency wallets in the process.
In September, McAfee Labs security specialists discovered malware targeting Android operating systems called SpyAgent. SpyAgent uses optical character recognition to scan images and steal sensitive information stored in images, including private key snapshots.
SpyAgent was distributed through links in text messages that initiated the download of seemingly harmless applications that were just disguised versions of malware. McAfee researchers have identified more than 280 rogue apps, all of which are associated with SpyAgent.
Cybersecurity firm Facct also recently discovered a unique malware distribution method that uses automated emails to install modified XMrig mining software. This modification of legitimate software allows attackers to mine cryptocurrency using the victims' compromised devices.
