Connect with us

Published

on

Understanding recent credential leaks and the rise of InfoStealer malware

Opinion by: Jimmy Su, Binance chief security officer

The threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond. InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s knowledge. This includes passwords, session cookies, crypto wallet details and other valuable personal information.

According to Kaspersky, these malware campaigns leaked over 2 million bank card details last year. And that number is only growing.

Malware-as-a-service

These tools are widely available via the malware-as-a-service model. Cybercriminals can access advanced malware platforms that offer dashboards, technical support and automatic data exfiltration to command-and-control servers for a subscription fee. Once stolen, data is sold on dark web forums, Telegram channels or private marketplaces.

The damage from an InfoStealer infection can go far beyond a single compromised account. Leaked credentials can lead to identity theft, financial fraud and unauthorized access to other services, especially when credentials are reused across platforms.

Recent: Darkweb actors claim to have over 100K of Gemini, Binance user info

Binance’s internal data echoes this trend. In the past few months, we’ve identified a significant uptick in the number of users whose credentials or session data appear to have been compromised by InfoStealer infections. These infections don’t originate from Binance but affect personal devices where credentials are saved in browsers or auto-filled into websites.

Distribution vectors

InfoStealer malware is often distributed via phishing campaigns, malicious ads, trojan software or fake browser extensions. Once on a device, it scans for stored credentials and transmits them to the attacker.

The common distribution vectors include:

  • Phishing emails with malicious attachments or links.

  • Fake downloads or software from unofficial app stores.

  • Game mods and cracked applications are shared via Discord or Telegram.

  • Malicious browser extensions or add-ons.

  • Compromised websites that silently install malware (drive-by downloads).

Once active, InfoStealers can extract browser-stored passwords, autofill entries, clipboard data (including crypto wallet addresses) and even session tokens that allow attackers to impersonate users without knowing their login credentials.

What to watch out for 

Some signs that might suggest an InfoStealer infection on your device:

  • Unusual notifications or extensions appearing in your browser.

  • Unauthorized login alerts or unusual account activity.

  • Unexpected changes to security settings or passwords.

  • Sudden slowdowns in system performance.

A breakdown of InfoStealer malware

Over the past 90 days, Binance has observed several prominent InfoStealer malware variants targeting Windows and macOS users. RedLine, LummaC2, Vidar and AsyncRAT have been particularly prevalent for Windows users. 

  • RedLine Stealer is known for gathering login credentials and crypto-related information from browsers.

  • LummaC2 is a rapidly evolving threat with integrated techniques to bypass modern browser protections such as app-bound encryption. It can now steal cookies and crypto wallet details in real-time.

  • Vidar Stealer focuses on exfiltrating data from browsers and local applications, with a notable ability to capture crypto wallet credentials.

  • AsyncRAT enables attackers to monitor victims remotely by logging keystrokes, capturing screenshots and deploying additional payloads. Recently, cybercriminals have repurposed AsyncRAT for crypto-related attacks, harvesting credentials and system data from compromised Windows machines.

For macOS users, Atomic Stealer has emerged as a significant threat. This stealer can extract infected devices’ credentials, browser data and cryptocurrency wallet information. Distributed via stealer-as-a-service channels, Atomic Stealer exploits native AppleScript for data collection, posing a substantial risk to individual users and organizations using macOS. Other notable variants targeting macOS include Poseidon and Banshee.

At Binance, we respond to these threats by monitoring dark web marketplaces and forums for leaked user data, alerting affected users, initiating password resets, revoking compromised sessions and offering clear guidance on device security and malware removal.

Our infrastructure remains secure, but credential theft from infected personal devices is an external risk we all face. This makes user education and cyber hygiene more critical than ever.

We urge users and the crypto community to be vigilant to prevent these threats by using antivirus and anti-malware tools and running regular scans. Some reputable free tools include Malwarebytes, Bitdefender, Kaspersky, McAfee, Norton, Avast and Windows Defender. For macOS users, consider using the Objective-See suite of anti-malware tools

Lite scans typically don’t work well since most malware self-deletes the first-stage files from the initial infection. Always run a full disk scan to ensure thorough protection.

Here are some practical steps you can take to reduce your exposure to this and many other cybersecurity threats:

  • Enable two-factor authentication (2FA) using an authenticator app or hardware key.

  • Avoid saving passwords in your browser. Consider using a dedicated password manager.

  • Download software and apps only from official sources.

  • Keep your operating system, browser and all applications up to date.

  • Periodically review authorized devices in your Binance account and remove unfamiliar entries.

  • Use withdrawal address whitelisting to limit where funds can be sent.

  • Avoid using public or unsecured WiFi networks when accessing sensitive accounts.

  • Use unique credentials for each account and update them regularly.

  • Follow security updates and best practices from Binance and other trusted sources.

  • Immediately change passwords, lock accounts and report through official Binance support channels if malware infection is suspected.

The growing prominence of the InfoStealer threat is a reminder of how advanced and widespread cyberattacks have become. While Binance continues to invest heavily in platform security and dark web monitoring, protecting your funds and personal data requires action on both sides.

Stay informed, adopt security habits and maintain clean devices to significantly reduce your exposure to threats like InfoStealer malware.

Opinion by: Jimmy Su, Binance chief security officer.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Continue Reading

Politics

‘My lawyers are ready’ for questions about corruption claims, ex-minister tells Sky News

Published

on

By

'My lawyers are ready' for questions about corruption claims, ex-minister tells Sky News

Tulip Siddiq has told Sky News her “lawyers are ready” to handle any formal questions about allegations she is involved in corruption in Bangladesh.

Asked whether she regrets apparent links with the Bangladeshi Awami League political party, Ms Siddiq said “why don’t you look at my legal letter and see if I have any questions to answer… [the Bangladeshi authorities] have not once contacted me and I’m waiting to hear from them”.

The London MP resigned as a Treasury minister in January after being named in several corruption inquiries in Bangladesh.

In her first public comments since leaving government, Ms Siddiq said “there’s been allegations for months on end and no one has contacted me”.

Last month, the interim leader of Bangladesh told Sky News the MP had “wealth left behind” in the country “and should be made responsible”.

Lawyers acting for Ms Siddiq wrote to the Bangladeshi Anti Corruption Commission (ACC) several weeks ago saying the allegations were “false and vexatious”.

The letter said the ACC must put questions to Ms Siddiq “by no later than 25 March 2025” or “we shall presume that there are no legitimate questions to answer”.

More on Bangladesh

Please use Chrome browser for a more accessible video player

Staff from the NCA visited Bangladesh as part of initial work to support the interim government in the country.

In a post online today, the former minister said the deadline had expired and the authorities had not replied.

Sky News has approached the Bangladeshi government for comment.

The allegations against Ms Siddiq are focused on links to her aunt Sheikh Hasina – who served as the prime minister of Bangladesh for 20 years.

Ms Hasina was forced to flee the country in August following weeks of deadly protests.

She is accused of becoming an autocrat, with politically-motivated arrests, extra-judicial killings and other abuses allegedly happening on her watch. Hasina claims it’s all a political witch hunt.

Electrocuted on their genitals and mouths sewn up: Inside Bangladesh’s ‘death squad’ jails

Ms Siddiq was found to have lived in several London properties that had links back to the Awami League political party that her aunt still leads.

She referred herself to the prime minister’s standards adviser Sir Laurie Magnus who said he had “not identified evidence of improprieties” but added it was “regrettable” Ms Siddiq had not been more alert to the “potential reputational risks” of the ties to her aunt.

Ms Siddiq said continuing in her role would be “a distraction” for the government but insisted she had done nothing wrong.

Continue Reading

Politics

Former New York governor advised OKX over $505M federal probe: Report

Published

on

By

Former New York governor advised OKX over 5M federal probe: Report

Former New York governor advised OKX over 5M federal probe: Report

Cryptocurrency exchange OKX reportedly hired former New York Governor Andrew Cuomo to advise it over the federal probe that resulted in the firm pleading guilty to several violations and agreeing to pay $505 million in fines and penalties.

Cuomo, a New York-registered attorney, advised OKX on legal issues stemming from the probe sometime after August 2021 when he resigned as New York overnor, Bloomberg reported on April 2, citing people familiar with the matter.

“He spoke with company executives regularly and counseled them on how to respond to the criminal investigation,” Bloomberg said.

The Seychelles-based firm pled guilty to operating an unlicensed money-transmitting business in violation of US Anti-Money Laundering laws on Feb. 24 and agreed to pay $84 million worth of penalties while forfeiting $421 million worth of fees earned from mostly institutional clients.

The breaches occurred from 2018 to 2024 despite OKX having an official policy preventing US persons from transacting on its crypto exchange since 2017, the Department of Justice noted at the time.

A spokesperson for Cuomo, Rich Azzopardi, told Bloomberg that Cuomo has been providing private legal services representing individuals and corporations on a variety of matters since resigning as New York governor.

“He has not represented clients before a New York city or state agency and routinely recommends former colleagues for positions,”  Azzopardi added.

OKX reportedly wasn’t willing to comment on its relationships with outside firms.

Cuomo also influenced OKX to make executive appointments: Bloomberg

Cuomo, who is now running for mayor of New York City, also advised OKX to appoint his friend US Attorney Linda Lacewell to OKX’s board of directors, Bloomberg said.

Lacewell, a former superintendent of the New York Department of Financial Services, was added to the board in 2024 and was named OKX’s new chief legal officer on April 1, according to a recent company statement.

Former New York governor advised OKX over $505M federal probe: Report

Source: Linda Lacewell

Related: New York bill aims to protect crypto investors from memecoin rug pulls

After the investigation concluded, OKX said it would seek out a compliance consultant to remedy the issues stemming from the federal probe and bolster its regulatory compliance program.

“Our vision is to make OKX the gold standard of global compliance at scale across different markets and their respective regulatory bodies,” OKX CEO Star Xu said in a Feb. 24 X post.

Magazine: Financial nihilism in crypto is over — It’s time to dream big again

Continue Reading

Politics

Trump imposes 10% tariff on all countries, reciprocal levies on trading partners

Published

on

By

Trump imposes 10% tariff on all countries, reciprocal levies on trading partners

Trump imposes 10% tariff on all countries, reciprocal levies on trading partners

United States President Donald Trump signed an executive order establishing reciprocal tariffs on trading partners and a 10% baseline tariff on all imports from all countries.

The reciprocal levies on will be approximately half of what trading partners charge for US imports, Trump said. For example, China currently has a tariff of 67% on US imports, so US reciprocal tariffs on Chinese goods will be 34%. Trump also announced a standard 25% tariff on all automobile imports.

Trump told the media that tariffs would return the country to economic prosperity seen in previous centuries:

“From 1789 to 1913, we were a tariff-backed nation. The United States was proportionately the wealthiest it has ever been. So wealthy, in fact, that in the 1880s, they established a commission to decide what they were going to do with the vast sums of money they were collecting.”

“Then, in 1913, for reasons unknown to mankind, they established the income tax so that citizens, rather than foreign countries, would start paying,” Trump said.

Economy, US Government, United States, Donald Trump

Full breakdown of reciprocal tariffs by country. Source: Cointelegraph

Trump presented the tariffs through the lens of economic protectionism and hinted at returning to the economic policies of the 19th century by using them to replace the income tax.

Related: Bitcoin rally to $88.5K obliterates bears as spot volumes soar — Will a tariff war stop the party?

Trump proposes eliminating federal income tax and replacing it with tariff revenue

Trump proposed the idea of abolishing the Internal Revenue Service (IRS) and funding the federal government exclusively through trade tariffs while still on the campaign trail in October 2024.

According to accounting automation company Dancing Numbers, Trump’s plan could save each American taxpayer $134,809-$325,561 in taxes throughout their lives.

Economy, US Government, United States, Donald Trump

US President Donald Trump addresses the media about reciprocal trade tariffs at the April 2 press event. Source: Fox 4 Dallas

The higher range of the tax savings estimate will only occur if other wage-based taxes are eliminated at the state and municipal levels.

Commerce Secretary Howard Lutnick, who assumed office in February, also voiced support for replacing the IRS with the “External Revenue Service.”

Lutnick said that the US government cannot balance a budget yet consistently demands more from its citizens every year. Tariffs will also protect American workers and strengthen the US economy, he said.

Magazine: Elon Musk’s plan to run government on blockchain faces uphill battle

Continue Reading

Trending