Trojan Risks MetaMask, Coinbase Cryptocurrency Wallet Browser Extensions

Summary

  • Microsoft is warning about a new Trojan malware, StilachiRAT, specifically targeting cryptocurrency wallet extensions on Google Chrome, posing a significant threat to users of affected wallets.

  • StilachiRAT can steal sensitive information, including browser credentials, crypto wallet data, and clipboard content, and impacts 20 different wallet extensions, including MetaMask, Coinbase Wallet, and Trust Wallet.

  • Users of cryptocurrency wallet browser extensions on Chrome should immediately check browser plugins, clear browser history, run antivirus scans, and enhance cryptocurrency wallet security measures.

  • Microsoft warns of StilachiRAT’s sophisticated nature and stealth tactics, further emphasizing that users with impacted Chrome wallet extensions need not only action-specific fixes and recommended security changes advised but also now maintain persistently heightened levels of their user vigilance due to the challenge posed by malware to remain fully undetected over extended periods of time, relying wholly on automated responses.

Microsoft has issued an alert regarding newly discovered Trojan malware known as StilachiRAT, which specifically targets cryptocurrency wallet extensions in the Google Chrome browser environment.

Identified by Microsoft’s Incident Response team in November 2024, StilachiRAT exhibits the capability to steal private user information, including saved login credentials within browsers, cryptocurrency wallet details, clipboard content, and comprehensive system profiles.

This malware is confirmed to compromise 20 distinct cryptocurrency wallet extensions. The targeted extension list encompasses popular options like Bitget Wallet, Trust Wallet, TronLink, MetaMask, TokenPocket, BNB Chain Wallet, OKX Wallet, Sui Wallet, Braavos – Starknet Wallet, Coinbase Wallet, Leap Cosmos Wallet, Manta Wallet, Keplr, Phantom, Compass Wallet for Sei, Math Wallet, Fractal Wallet, Station Wallet, ConfluxPortal, and Plug.

While the current distribution of StilachiRAT is reported as limited, it is categorized as a significant danger due to its subtle methods of operation making its detection challenging.

Recommended User Actions

Users operating crypto wallet browser extensions on Google Chrome should exercise heightened vigilance.

Microsoft’s recommended security responses include scrutinizing installed browser plugins, erasing browser histories, and conducting thorough antivirus system scans. Additional key guidance advises that users should abstain from downloading any files from unverified sources and reinforce their cryptocurrency wallet security settings further.

Technical Operation of StilachiRAT

StilachiRAT employs various sophisticated techniques designed to evade standard security software detection and establish persistent presence within infected computer systems.

A constituent module within the malware infrastructure, identified as WWStartupCtrl64.dll, focuses intensely on extracting sensitive credentials directly kept within browser applications and associated crypto wallet extensions—underscoring the gravitas of the threat specifically toward users of these digital tools.

While, as yet, Microsoft has explicitly not attributed authorship of StilachiRAT or defined a definitive geographical origin for it, releasing information regarding its capacities represents part of the company’s commitment to continually tracking and countering emerging cybersecurity hazards generally.

Strengthen Digital Defenses Against Evolving Threats

In order to mitigate the scope of damaging operational influence potentially resulting from StilachiRAT intrusion, Microsoft subsequently publishes supplementary advisory notes focused on specific preventative measures targeted toward curtailing StilachiRAT’s damaging influence on users security environments overall:

Delivery may rely on vectors that underline the implementation of wider systemic safeguard regimes effectively, limiting avenues for platform access, intrusion attempts, target compromises arising from various exploitation point origination, attack propagation, vector selection process compromise onset.

Possible vectors widely encompassing relevant vector prevention procedures effectively proactively address minimizing system vulnerability profiles attack compromise eventualities.

Also Read: Hackers Blackmail YouTubers to Spread Crypto Malware 

Cybercriminals are using YouTube’s copyright system to blackmail influencers into spreading crypto-mining malware called SilentCryptoMiner. The malware mines cryptocurrencies secretly, including Ethereum and Monero, and hijacks devices for crypto-mining. Kaspersky, a cybersecurity firm, warns of growing influencer security threats and warns of expanding tactics. Influencers are pressured to post malware links in video descriptions, and viewers are tricked into downloading infected files disguised as useful software… [Read More]

*Disclaimer*: We at Bitcoinleef.com present you with the latest information in the crypto market. However, this information should not be regarded as financial advice and viewers should consult their financial advisors before investing.