User-Agent information about the components of the PC (video cards, processors)Īll browser passwords/creditcards/cookies on Chromium (Chrome etc.)Īll browser passwords/creditcards/cookies running on Gecko (Mozilla etc. Here's a list of what it steals from you. It is capable of stealing virtually everything you have saved on your computer. The malware that has been circulating in the NFT community offers a wide range of capabilities. When I looked at this website, I discovered that it was a direct clone of the real version of the application described. The attacker provided me a link to a website. Again, the goal is to establish trust with their victim. All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. They referred to me as a professional, which is why they came to me. As you can see, the attacker cited one of my artworks, ‘'Vision" indicating that they are well-versed in my work. The attacker did their research to learn more about the type of artwork I create, which is abstract multi-colored work with sorted pixels, exactly what the attacker is mentioning.Īnother screenshot from the conversation. Let's go back to where I discussed what social engineering is for a second. The attacker also described adjusting the number of pixels, using rich color correction, and coloring the image to your liking. The majority of businesses do not pay in ETH and instead use a fiat currency. The attacker sent me a DM on Twitter with a decent introductionĪccording to the attacker, payment would be made in ETH.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |