New Malware, Rilide, targets crypto holders, differs from other types of malware as it uses fake dialog boxes to deceive users and gain access to their two-factor authentication codes, thus allowing the malware to withdraw cryptocurrencies in the background without the user’s knowledge.
Rilide has been discovered by SpiderLabs researchers, who have found that its code was released on an underground forum due to a payment dispute. The researchers have also discovered two malicious campaigns that lead to the installation of the Rilide extension. One campaign involves a module that contains an encoded blob of data storing the URL for the Rilide loader.
To protect against such threats, experts advise remaining vigilant against unsolicited messages and emails and to keep informed about the latest cybersecurity threats and safety practices to minimize the risk of falling victim to phishing attacks.