A targeted phishing campaign is actively abusing the Cardano ecosystem by posing as a legitimate release of an “Eternl Desktop” wallet application. Instead of delivering an authentic wallet client, the attackers distribute a trojanized installer that silently deploys a remote monitoring and management (RMM) tool on victim systems. This grants threat actors persistent remote access, enabling them to steal cryptocurrency wallet credentials, seed phrases, and ultimately drain funds. The campaign demonstrates a growing trend of abusing legitimate enterprise tools to evade detection while targeting high-value crypto users. The attack begins with well-crafted phishing emails claiming the official launch of an “Eternl Desktop” wallet, often referencing real Cardano initiatives to increase credibility. Victims are urged to download the installer from a look-alike domain designed to resemble a legitimate wallet distribution site. Once executed, the MSI installer does not install a wallet application. Instead, it silently installs LogMeIn Resolve, a legitimate RMM solution commonly used for IT support. Because the dropped payload is a trusted commercial tool, it can bypass traditional antivirus and reputation-based defenses. The installed RMM component enables unattended access, remote command execution, system monitoring, and file manipulation. With this level of control, attackers can observe wallet usage, capture sensitive data, install additional malware, or directly interfere with cryptocurrency transactions. The abuse of a legitimate RMM tool significantly lowers the attacker’s operational risk and allows long-term persistence without raising immediate suspicion.
Cybersecurity researchers have uncovered a sophisticated gateway-monitoring and adversary-in-the-middle (AitM) framework called DKnife, operated by China-linked threat actors since...
China-nexus threat actors have been observed conducting coordinated cyber-espionage operations targeting organizations across multiple sectors worldwide. These campaigns focus on l...
The Pakistan-linked advanced persistent threat (APT) group Transparent Tribe (also tracked as APT36) has shifted its focus from traditional government and defense targets to compro...