{"id":15103,"date":"2019-04-16T08:10:08","date_gmt":"2019-04-16T16:10:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/16\/news-8852\/"},"modified":"2019-04-16T08:10:08","modified_gmt":"2019-04-16T16:10:08","slug":"news-8852","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/16\/news-8852\/","title":{"rendered":"Electrum Bitcoin wallets under siege"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 16 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<p><em>By Adam Thomas, with additional contributions from J\u00e9r\u00f4me Segura, Vasilios Hioueras and S!Ri<\/em><\/p>\n<p>Since at least late December 2018, many users of the popular <a rel=\"noreferrer noopener\" aria-label=\"Electrum Bitcoin wallet (opens in a new tab)\" href=\"https:\/\/en.bitcoin.it\/wiki\/Electrum\" target=\"_blank\">Electrum Bitcoin wallet<\/a> have fallen victim to a series of phishing attacks, which we estimate netted crooks well over 771 Bitcoins\u2014an amount equivalent to approximately $4 million USD at current exchange rates. <\/p>\n<p>Threat actors were able to trick users into downloading a malicious version of the wallet by exploiting a weakness in the Electrum software.<\/p>\n<p>As a result, in <a rel=\"noreferrer noopener\" aria-label=\"February (opens in a new tab)\" href=\"https:\/\/twitter.com\/ElectrumWallet\/status\/1093561779031076864\" target=\"_blank\">February<\/a> the developers behind Electrum decided to exploit the same flaw in their own software in order to redirect users to download the latest patched version. The software was in such trouble that in <a rel=\"noreferrer noopener\" aria-label=\"March (opens in a new tab)\" href=\"https:\/\/twitter.com\/ElectrumWallet\/status\/1106479573917724672\" target=\"_blank\">March<\/a>, developers began exploiting another vulnerability unknown to the public, essentially attacking vulnerable clients to keep them from connecting to bad nodes.<\/p>\n<p>Shortly after, a botnet launched <a rel=\"noreferrer noopener\" aria-label=\"distributed denial of service (DDoS) attacks (opens in a new tab)\" href=\"https:\/\/www.nasdaq.com\/article\/electrum-servers-remain-under-sustained-dos-attack-cm1127438\" target=\"_blank\">distributed denial of service (DDoS) attacks<\/a> against Electrum servers for what is believed to be retaliation against developers for trying to fix the bug. Attackers reversed the scenario so that legitimate nodes became so overwhelmed that older clients had to connect to malicious nodes.<\/p>\n<p>In this post, we shed light on the phishing scheme used to push the malicious Electrum update, discuss where the stolen funds have gone, and finally look at the malware infections directly involved with the DDoS botnet.<\/p>\n<h3>Electrum wallet 101<\/h3>\n<p>In order to get a better idea of how these attacks became so successful, it is helpful to have a basic understanding of how the Electrum wallet functions.<\/p>\n<p>Known as a \u201clightweight\u201d Bitcoin wallet, Electrum implements a variation of a technique described in Satoshi Nakamoto\u2019s Bitcoin <a href=\"https:\/\/www.bitcoin.com\/bitcoin.pdf\u200b\">white paper<\/a><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.bitcoin.com\/bitcoin.pdf\u200b\" target=\"_blank\">\u200b<\/a> called Simplified Payment Verification (SPV). SPV allows\u200b \u200ba user to send and receive transactions without downloading a full copy of the Bitcoin blockchain (which is hundreds of gigabytes in size). <\/p>\n<p>Instead, Electrum operates in a client\/server configuration. The wallet (client) is programmed by default to connect to a network of peers (server) in order to verify that transactions are valid. <\/p>\n<p>While this has historically been a fairly secure method of transacting, attackers have taken advantage of the fact that anyone is allowed to operate as a public Electrum peer. As shown below, there has been a substantial increase in the number of peers active on the Electrum network: <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38102\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/active_peers\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers.png\" data-orig-size=\"974,622\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"active_peers\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers-300x192.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers-600x383.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers.png\" alt=\"\" class=\"wp-image-38102\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers-300x192.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/active_peers-600x383.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption><em>\ufeffSource: http:\/\/vps.hsmiths.com:49001\/munin\/hsmiths.com\/vps.hsmiths.com\/electrumx_peers.html <\/em><\/figcaption><\/figure>\n<\/div>\n<h3>Fake Electrum wallet update notification<\/h3>\n<p>On December 26, 2018, the developer of Electrum issued a public warning on the official GitHub page providing some information about an ongoing attack: <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u200b<em>To users: when you broadcast a transaction, servers can tell you about errors with the transaction. In Electrum versions before 3.3.3, this error is arbitrary text, and what&#8217;s worse, it is HTML\/rich text (as that is the Qt default). So the server you are connected to can try to trick you by telling you to install malware (disguised as an update). You should update Electrum from the official website so that servers can no longer do this to you. If you see these messages\/popups, just make sure you don&#8217;t follow them and that you don&#8217;t install what they tell you to install. The messages are just messages, they cannot hurt you by themselves.<\/em><\/p>\n<\/blockquote>\n<p>The threat actors basically conducted a <a href=\"https:\/\/medium.com\/coinmonks\/sybil-attack-and-byzantine-generals-problem-2b2366b7146b\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Sybil attack<\/a> on the Electrum network by introducing more malicious nodes than honest nodes.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38131\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/maliciousnodes\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes.png\" data-orig-size=\"630,611\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"maliciousnodes\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes-300x291.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes-600x582.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes-600x582.png\" alt=\"\" class=\"wp-image-38131\" width=\"450\" height=\"437\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes-600x582.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes-300x291.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/maliciousnodes.png 630w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption>Legitimate Electrum wallet app showing malicious nodes<\/figcaption><\/figure>\n<\/div>\n<p>If a user connects to a malicious node (a high likelihood), and attempts to send a transaction through it, it would be blocked due to the weakness in Electrum allowing arbitrary HTML\/rich text to be received and displayed, such as the fake update message seen below:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38122\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/fakeupdate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate.png\" data-orig-size=\"893,1394\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"fakeupdate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate-192x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate-384x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate.png\" alt=\"\" class=\"wp-image-38122\" width=\"447\" height=\"697\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate.png 893w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate-192x300.png 192w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/fakeupdate-384x600.png 384w\" sizes=\"auto, (max-width: 447px) 100vw, 447px\" \/><figcaption><em>Phishing code injected into Electrum app when attempting to send Bitcoins<\/em><\/figcaption><\/figure>\n<\/div>\n<p>This second stage of the attack tricks the user into installing a malicious version of the Electrum wallet. Two different rogue projects were active on Github from around December 21 through December 27. <\/p>\n<pre class=\"wp-block-preformatted\">hxxps:\/\/github.com\/electrum-project\/electrum\/releases\/tag\/3.4.1<br \/>hxxps:\/\/github.com\/electrum-wallet\/electrum\/releases <\/pre>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38104\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/github-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github.png\" data-orig-size=\"974,608\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"github\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github-300x187.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github-600x375.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github.png\" alt=\"\" class=\"wp-image-38104\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github-300x187.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/github-600x375.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption>Malicious Electrum app repository<\/figcaption><\/figure>\n<\/div>\n<h3>Malicious Electrum wallets<\/h3>\n<p>For practical purposes, we will refer to the following malware as Variant 1 and Variant 2, however, further research has revealed that the actors behind this specific campaign have been in operation for quite some time. Thus, it seems likely that there were other variations of this malware in existence prior to December 21, 2018. Variants 1 and 2 appear to be operated by distinct actors based on several differences in the malware. <\/p>\n<h4><strong>Variant 1<\/strong><\/h4>\n<p>Variant 1 is unique in the fact that malware authors have implemented a function to upload stolen wallet keys and seed data to a remote server. Additional effort has been made to ensure that this function is kept hidden by obfuscating the data exfiltration code inside a file not normally found in Electrum named initmodules.py. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38105\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/malware1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1.png\" data-orig-size=\"874,1229\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"malware1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1-213x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1-427x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1.png\" alt=\"\" class=\"wp-image-38105\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1.png 874w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1-213x300.png 213w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/malware1-427x600.png 427w\" sizes=\"(max-width: 874px) 100vw, 874px\" \/><figcaption>Rogue module responsible for data exfiltration<\/figcaption><\/figure>\n<\/div>\n<p>As mentioned, the exfiltration domains are not visible in the above code and are instead constructed during execution of the malware. This is most likely a technique used by the malware authors in order to make the code contained within initmodules.py appear legitimate. <\/p>\n<p>In addition to the theft of wallet data, any balance present in the wallet is sent to one of several pre-programmed public addresses under control of the attackers. The destination address chosen is dependent on the address format utilized by the infected users\u2019 Electrum wallet. <\/p>\n<p>Pay-to-PubkeyHash (P2PKH) addresses are the default in use during setup and likely the most common address type in use by the casual Bitcoin user. This fact is evident when looking up the activity of each address. <\/p>\n<pre class=\"wp-block-preformatted\"><em>14MVEf1X4Qmrpxx6oASqzYzJQZUwwG7Fb5<\/em> (P2PKH address type)<br \/>Total Received: 202.91141530 BTC ~ 776,243.23 USD<br \/><br \/><em>bc1q9h36cyfnqcxjeuw629kwmnp5a7k5pky8l2kzww <\/em><br \/>Total Received: 0.01927492 BTC ~ 73.75 USD<br \/><br \/><em>1rTt8GePHv8LceXnujWqerUd81U29m857<\/em><br \/>Total Received: 0 BTC<br \/><br \/><em>3CrC4UitJqNqdkXY5XbJfCaGnbxHkKNqzL<\/em><br \/>Total Received: 15.22210788 BTC ~ 58,239.77 USD<br \/><br \/><em>1FmxAHft8trWjhRNvDsbjD8JNoSzDX8pfD<\/em><br \/>Total Received: 0 BTC <\/pre>\n<p><strong>Variant 1 Bitcoin total: 218.1527981 BTC<\/strong><br \/><strong>Variant 1 USD total: ~$1,101,034.00 <\/strong><\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"38126\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/keyprivate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate.png\" data-orig-size=\"524,152\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"keyprivate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate-300x87.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate.png\" alt=\"\" class=\"wp-image-38126\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate.png 524w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/keyprivate-300x87.png 300w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/><figcaption>Sample extended Private Key (xprv) sent to malicious server using HTTP POST <\/figcaption><\/figure>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"38125\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/seedwallet\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet.png\" data-orig-size=\"413,143\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"seedwallet\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet-300x104.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet.png\" alt=\"\" class=\"wp-image-38125\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet.png 413w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/seedwallet-300x104.png 300w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/><figcaption>Sample wallet seed words sent to malicious server using HTTP POST<\/figcaption><\/figure>\n<p>All of the malicious data exfiltration domains observed during our analysis of Variant 1 were created at the same time and all have been observed resolving to the IP address 31.31.196.86. This address belongs to Reg.ru, a hosting company based in Moscow, Russia. <\/p>\n<p>Variant 1 binaries are also unique from later variants due to the fact that its Windows installers have been digitally signed.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38127\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/cert-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert.png\" data-orig-size=\"512,515\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cert\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert-298x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert.png\" alt=\"\" class=\"wp-image-38127\" width=\"332\" height=\"334\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert.png 512w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert-150x150.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/cert-298x300.png 298w\" sizes=\"auto, (max-width: 332px) 100vw, 332px\" \/><figcaption>Malicious app using a digital certificate<\/figcaption><\/figure>\n<\/div>\n<p>Interestingly, the digital certificate used to sign one of the malicious Windows Electrum files (EIZ Ltd) has recently been used to sign an <a rel=\"noreferrer noopener\" aria-label=\"unrelated malware (opens in a new tab)\" href=\"https:\/\/www.virustotal.com\/gui\/file\/5fc3d8522e64c5bcbc3aaa765f7b5186e47b126110f17f272de74448e02e029f\/detection\" target=\"_blank\">unrelated malware<\/a>.<em> <\/em><\/p>\n<h4><strong>Variant 2 <\/strong><\/h4>\n<p>Since Variant 1 was so successful in stealing substantial amounts of Bitcoin, it seemed almost inevitable that additional attacks would be mounted by threat actors looking to cash in on this reasonably easy scheme. Surely enough, a second variant of these malicious Electrum wallets appeared. This variant has attacked quite aggressively, overtaking the Electrum network and resulting in the theft of more Bitcoin than Variant 1. <\/p>\n<p>Instead of redirecting victims to a malicious Github site, Variant 2 hosts the malicious downloads on a domain with similar spellings as the legitimate Electrum download site. The HTML content is essentially a mirror image. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38113\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/forum-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum.png\" data-orig-size=\"974,987\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"forum\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum-296x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum-592x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum-592x600.png\" alt=\"\" class=\"wp-image-38113\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum-592x600.png 592w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum-296x300.png 296w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/forum.png 974w\" sizes=\"(max-width: 592px) 100vw, 592px\" \/><figcaption>Fake website, a copy-cat of the legitimate one <\/figcaption><\/figure>\n<\/div>\n<p>The threat actors seem to have a good understanding of Electrum and its code. For example, they disabled auto updates, removed prompts, such as &#8220;Yes I am sure&#8221;, and even took away the ability to perform Replace-by-Fee (RBF) transactions. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38166\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/main-66\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1.png\" data-orig-size=\"974,1004\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"main\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1-291x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1-582x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1.png\" alt=\"\" class=\"wp-image-38166\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1-291x300.png 291w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/main-1-582x600.png 582w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption>Contents of main_window.py<\/figcaption><\/figure>\n<\/div>\n<p>Replace-by-Fee is a function that was added to the Bitcoin codebase later on in development that would allow users to essentially create a double spend transaction. In this case, if you knew about this function (and probably few do), you could reverse the stolen funds transfer by double spending the input using a higher fee.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38195\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/rbfremoved2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2.png\" data-orig-size=\"1808,450\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"rbfremoved2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2-300x75.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2-600x149.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2.png\" alt=\"\" class=\"wp-image-38195\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2.png 1808w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2-300x75.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/rbfremoved2-600x149.png 600w\" sizes=\"(max-width: 1808px) 100vw, 1808px\" \/><figcaption>Replace-by-Fee function commented out in screens.py code<\/figcaption><\/figure>\n<\/div>\n<p>For example, if you installed the malicious wallet and lost a bunch of Bitcoin, one of the only ways you could get it back would be by attempting a RBF transaction to reverse the malicious one. But you&#8217;d have to act quick before the malicious one was confirmed. By disabling this feature, the threat actors made sure this wouldn&#8217;t be possible.<\/p>\n<p>Below is the modified source code of Variant 2, a paytoedit.pyc script file redirecting payment to a hard-coded attacker Bitcoin address: <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38120\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/wallet-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet.png\" data-orig-size=\"537,126\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"wallet\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet-300x70.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet.png\" alt=\"\" class=\"wp-image-38120\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet.png 537w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/wallet-300x70.png 300w\" sizes=\"(max-width: 537px) 100vw, 537px\" \/><figcaption>Bitcoin address that will receive stolen funds<\/figcaption><\/figure>\n<\/div>\n<pre class=\"wp-block-preformatted\"><em>bc1qhsrl6ywvwx44zycz2tylpexza4xvtqkv6d903q<\/em><br \/>Total received: 187.8298 BTC \/ 941,436 USD<br \/><br \/><em>bc1q92md7868uun8vplp9te0vaecmxyc5rrphdyvxg<\/em><br \/>Total received: 55.9948 BTC \/ 201,326 USD<br \/><br \/><em>bc1q7hsnpd794pap2hd3htn8hszdfk5hzgsj5md9lz<\/em><br \/>Total received: 36.7358 BTC \/ 126,972 USD<br \/><br \/>bc1ql0p2lrnnxkxnw52phyq8tjr7elsqtnncad6mfv<br \/>Total received: 75.2927 BTC \/ 291,342 USD<br \/><br \/>bc1qyjkcthq9whn3e8h9dd26gjr9kd8pxmqdgvajwv<br \/>Total received: 21.8628 BTC \/ 84,678 USD<br \/><br \/>bc1qvr93mxj5ep58wlchdducthe89hcmk3a4uqpw3c<br \/>Total received: 27.3636 BTC \/ 138,733 USD<br \/><br \/>bc1qcla39fm0q8ka8th8ttpq0yxla30r430m4hgu3x <br \/>Total received: 232.6469 BTC \/ 1,166,068 USD<br \/><\/pre>\n<p><strong>Variant 2 Bitcoin total: 637.7264 BTC<\/strong><br \/><strong>Variant 2 USD total: ~$2,950,555.00 <\/strong><\/p>\n<h3>Where have all the coins gone? <\/h3>\n<p>Some simple blockchain analysis on the funds stolen by Variant 1 show us that the attackers have broken the BTC down into smaller amounts. In this case, 48.36 BTC is re-grouped mostly into 3.5 BTC amounts followed by 1.9 BTC amounts. <\/p>\n<p>Such a pattern is likely evidence that a money laundering technique known as &#8220;smurfing&#8221; is being used. With 1.9 BTC equal to approximately $7,000 USD, deposits of this amount are unlikely to trigger a currency transaction report (CTR), as this amount is under the $10,000 threshold. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38162\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/transaction1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1.png\" data-orig-size=\"974,479\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"transaction1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1-300x148.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1-600x295.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1.png\" alt=\"\" class=\"wp-image-38162\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction1-600x295.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption>Smaller chunks of Bitcoin being laundered<\/figcaption><\/figure>\n<\/div>\n<p>Finally, the 11 outputs seen above are combined with an additional 15 inputs before being sent to 329nUnJxz5zgr4vnNPu8JNwpa3qEJfucQX, an address that feeds into the <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/bitcoinwhoswho.com\/address\/1Kr6QSydW9bFQG1mXiPNNu6WpJGmUa9i1g\/urlid\/0\" target=\"_blank\">well-known<\/a> hot wallet address for the cryptocurrency exchange Bitfinex.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38163\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/transaction2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2.png\" data-orig-size=\"974,693\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"transaction2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2-300x213.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2-600x427.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2.png\" alt=\"\" class=\"wp-image-38163\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2-300x213.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transaction2-600x427.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption>First step before reaching Bitfinex wallet<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38194\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/screen-shot-2019-04-15-at-5-31-18-pm\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM.png\" data-orig-size=\"2248,644\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Screen Shot 2019-04-15 at 5.31.18 PM\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM-300x86.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM-600x172.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM.png\" alt=\"\" class=\"wp-image-38194\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM.png 2248w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM-300x86.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-04-15-at-5.31.18-PM-600x172.png 600w\" sizes=\"(max-width: 2248px) 100vw, 2248px\" \/><figcaption>Final step before reaching Bitfinex hot wallet (1Kr6QSydW9bFQG1mXiPNNu6WpJGmUa9i1g) <\/figcaption><\/figure>\n<\/div>\n<p>On Sunday, April 14, we noticed that the attackers behind Variant 2 had just cashed out their newest wallet:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38155\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/variant2cash\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash.jpeg\" data-orig-size=\"1440,1064\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"variant2cash\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash-300x222.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash-600x443.jpeg\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash-600x443.jpeg\" alt=\"\" class=\"wp-image-38155\" width=\"426\" height=\"314\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash-600x443.jpeg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash-300x222.jpeg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/variant2cash.jpeg 1440w\" sizes=\"auto, (max-width: 426px) 100vw, 426px\" \/><figcaption>Variant 2 Bitcoin wallet notification<\/figcaption><\/figure>\n<\/div>\n<p>Many of the movements of stolen funds from Variant 2 appear to follow a similar pattern. Let\u2019s take a look at a recent withdrawal of 38.38517511 BTC from attacker address \u201cbc1qhsrl6ywvwx44zycz2tylpexza4xvtqkv6d903q\u201d. The total output is always split into 2 outputs:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38217\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/2outputs\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs.png\" data-orig-size=\"974,449\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2outputs\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs-300x138.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs-600x277.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs.png\" alt=\"\" class=\"wp-image-38217\" width=\"469\" height=\"216\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2outputs-600x277.png 600w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><figcaption>Transaction split in two outputs<\/figcaption><\/figure>\n<\/div>\n<p>Taking note of the transfer of 36.38011271 BTC which we will revisit later, let\u2019s first follow the transfer of 2.0050624 BTC to address \u201c1BCtXcP3gc7FygZMegeKUPsogo68aKRSPA\u201d followed by \u201c1wotccCFTuLQdCv46Bz3zqcosDCDwAWhd\u201d. We see a transaction containing 2 outputs in which address \u201c3DvWYYkzgHbyBgUTSjtPsLmkzs1R9frSrz\u201d consumes all of the funds. The other output named \u201cnot-address\u201d, is what is known as an <a href=\"https:\/\/en.bitcoin.it\/wiki\/OP_RETURN\">OP_RETURN<\/a> script opcode. This opcode is typically used to record data on the blockchain. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38218\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/opcode\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode.png\" data-orig-size=\"1334,536\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"opcode\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode-300x121.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode-600x241.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode.png\" alt=\"\" class=\"wp-image-38218\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode.png 1334w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode-300x121.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/opcode-600x241.png 600w\" sizes=\"(max-width: 1334px) 100vw, 1334px\" \/><figcaption>OP RETURN script opcode<\/figcaption><\/figure>\n<\/div>\n<p>Indeed, the transaction contains some encoded data most likely stored as part of a <a href=\"https:\/\/en.bitcoin.it\/wiki\/Multisignature\">multi-signature transaction<\/a>:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38219\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/multisig\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig.png\" data-orig-size=\"716,124\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"multisig\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig-300x52.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig-600x104.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig.png\" alt=\"\" class=\"wp-image-38219\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig.png 716w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig-300x52.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/multisig-600x104.png 600w\" sizes=\"(max-width: 716px) 100vw, 716px\" \/><\/figure>\n<\/div>\n<p>While the exact purpose of the data stored using OP_RETURN is unknown, it doesn\u2019t matter too much and we can still follow the forward movement of Variant 2 BTC funds in order to learn their destination: <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38221\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/destination-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination.png\" data-orig-size=\"849,567\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"destination\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination-300x200.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination-600x401.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination.png\" alt=\"\" class=\"wp-image-38221\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination.png 849w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination-300x200.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/destination-600x401.png 600w\" sizes=\"(max-width: 849px) 100vw, 849px\" \/><\/figure>\n<\/div>\n<p>The next largest output, 1.96991794, from the prior transaction, is consumed by transaction ID f5abb14ffc1d57494934d10a2114b2e4fc812b7e18f73d0f6202a995d2bea1be, which contains 445 inputs totaling 100.02103004 BTC.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38222\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/transactionf5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5.png\" data-orig-size=\"879,339\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"transactionf5\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5-300x116.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5-600x231.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5.png\" alt=\"\" class=\"wp-image-38222\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5.png 879w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5-300x116.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/transactionf5-600x231.png 600w\" sizes=\"(max-width: 879px) 100vw, 879px\" \/><\/figure>\n<\/div>\n<p>These 100 BTC are then moved to address 1NDyJtNTjmwk5xPNhjgAMu4HDHigtobu1s, the known hot wallet <a href=\"https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/9bwsaf\/investigating_the_1b_bitcoins_on_the_move_from_a\/\">address for Binance<\/a>. Let\u2019s take a quick look at the destination of the 36.38011271 BTC which we noted earlier. In the interest of brevity, we follow a similar path forward tracking funds as they are split up in similar fashion as those above:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38223\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/split-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split.png\" data-orig-size=\"869,263\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"split\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split-300x91.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split-600x182.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split.png\" alt=\"\" class=\"wp-image-38223\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split.png 869w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split-300x91.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/split-600x182.png 600w\" sizes=\"(max-width: 869px) 100vw, 869px\" \/><\/figure>\n<\/div>\n<p>As we see, 25.8 BTC are sent to the address \u201c3MRqgoPe6vBNVEn9Fo85qK7zvaLb9e9T2x\u201d. Many addresses associated with this wallet appear to be associated with what are seemingly scam websites offering to \u201cdouble your Bitcoin\u201d.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"3FF1uZ5oEaSZYKCvGbywu39djsknrGeu96 (opens in a new tab)\" href=\"https:\/\/bitcoinwhoswho.com\/address\/3FF1uZ5oEaSZYKCvGbywu39djsknrGeu96\ufeff\" target=\"_blank\">3FF1uZ5oEaSZYKCvGbywu39djsknrGeu96<\/a> &#8211; Continvest<br \/><a rel=\"noreferrer noopener\" href=\"https:\/\/bitcoinwhoswho.com\/address\/3AxHFZ2ivJUBgveyNj1PQak6FsKBcLJ42N\/urlid\/11986595%EF%BB%BF\" target=\"_blank\">3AxHFZ2ivJUBgveyNj1PQak6FsKBcLJ42N<\/a> &#8211; Bitcoin Doubler<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38225\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/doubler\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler.png\" data-orig-size=\"779,460\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"doubler\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler-300x177.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler-600x354.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler.png\" alt=\"\" class=\"wp-image-38225\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler.png 779w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler-300x177.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/doubler-600x354.png 600w\" sizes=\"(max-width: 779px) 100vw, 779px\" \/><\/figure>\n<\/div>\n<p>Since it is highly unlikely that you can simply double any amount of Bitcoins that you send, it is probable that these websites exist to offer another function such as mixing\/laundering of funds for criminals. <\/p>\n<h3>Countermeasures and reprisals<\/h3>\n<p>Faced with such widespread attacks against their user base, the developers behind Electrum decided to exploit the very same vulnerability in order to <a rel=\"noreferrer noopener\" aria-label=\"display a legitimate update notification (opens in a new tab)\" href=\"https:\/\/twitter.com\/ElectrumWallet\/status\/1093561779031076864\" target=\"_blank\">display a legitimate update notification<\/a>. However, this was not enough to stop the attackers, so later Electrum decided to run denial of service attacks against their own users to prevent them from connecting to rogue nodes.<\/p>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Electrum clients older than 3.3 can no longer connect to public electrum servers. We started exploiting a DOS vulnerability in those clients, in order to force their users to upgrade, and to prevent exposure to phishing messages. Linux Tail users should download our Appimage.<\/p>\n<p>&mdash; Electrum (@ElectrumWallet) <a href=\"https:\/\/twitter.com\/ElectrumWallet\/status\/1106479573917724672?ref_src=twsrc%5Etfw\">March 15, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>Criminals began doing the opposite with the help of a botnet.<\/p>\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Over 25k IP addresses are involved in DDoS against Electrum servers. They can be blacklisted by server operators, following these instructions: <a href=\"https:\/\/t.co\/lEA8lg2X4B\">https:\/\/t.co\/lEA8lg2X4B<\/a><\/p>\n<p>&mdash; Electrum (@ElectrumWallet) <a href=\"https:\/\/twitter.com\/ElectrumWallet\/status\/1116063328927985664?ref_src=twsrc%5Etfw\">April 10, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>A <a rel=\"noreferrer noopener\" href=\"https:\/\/hodlister.co\/electrum-client-blacklist\" target=\"_blank\">list<\/a> of attacking IP addresses (consisting of 72,977 machines at the time of writing) is being kept up-to-date. That number almost tripled within the span of the week, confirming that the attacks are ramping up at a fast pace.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38233\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/blocked-13\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked.png\" data-orig-size=\"949,344\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blocked\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked-300x109.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked-600x217.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked.png\" alt=\"\" class=\"wp-image-38233\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked.png 949w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked-300x109.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blocked-600x217.png 600w\" sizes=\"(max-width: 949px) 100vw, 949px\" \/><figcaption>Client IP addresses attacking Electrum servers. List updated every few minutes.<\/figcaption><\/figure>\n<\/div>\n<h3>The malware behind the botnet and DDoS attacks<\/h3>\n<p>Even though the exact size of the botnet is not clearly known, we were able to find out more about how new bots are recruited. We came across the malware behind this botnet from two different infection paths\u2014we assume that there are several more out there. One was via a <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/08\/smoke-loader-downloader-with-a-smokescreen-still-alive\/\" target=\"_blank\">Smoke Loader<\/a> instance that downloaded a secondary payload, while the other was from the RIG exploit kit.<\/p>\n<p>In the latter instance, we saw a malvertising campaign redirecting to the RIG exploit kit and ultimately delivering a loader that may appear as a coin miner, but is in fact malware that turns infected computers into individual bots for denial of service attacks against Electrum servers.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38150\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/rigpayload\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload.png\" data-orig-size=\"761,823\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RIGpayload\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload-277x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload-555x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload.png\" alt=\"\" class=\"wp-image-38150\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload.png 761w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload-277x300.png 277w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/RIGpayload-555x600.png 555w\" sizes=\"(max-width: 761px) 100vw, 761px\" \/><figcaption>Malvertising into RIG EK pushing Electrum malware behind DDoS attacks<\/figcaption><\/figure>\n<\/div>\n<p>We see the loader gathering a list of Electrum nodes to attack using a number of public wallet addresses. Each infected machine will start hammering legitimate Electrum nodes to wreak havoc.<\/p>\n<p>An analysis of this loader confirms the network activity we observed above:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38138\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/walletsetup\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup.png\" data-orig-size=\"960,392\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"walletsetup\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup-300x123.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup-600x245.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup.png\" alt=\"\" class=\"wp-image-38138\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup.png 960w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup-300x123.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/walletsetup-600x245.png 600w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><figcaption>Reversing loader shows network artifacts<\/figcaption><\/figure>\n<\/div>\n<p>It retrieves a large file (&gt;40MB) that is Python-compiled code (transactionservices.exe) for the Electrum wallet and writes it to disk.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38141\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/filecreation\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation.png\" data-orig-size=\"897,122\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"filecreation\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation-300x41.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation-600x82.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation.png\" alt=\"\" class=\"wp-image-38141\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation.png 897w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation-300x41.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/filecreation-600x82.png 600w\" sizes=\"(max-width: 897px) 100vw, 897px\" \/><figcaption>This .exe is a Python-compiled binary<\/figcaption><\/figure>\n<\/div>\n<p>It also adds a persistence mechanism for a sub-process called  transactionserviceshelper.exe.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38142\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/persistence-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence.png\" data-orig-size=\"898,183\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"persistence\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence-300x61.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence-600x122.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence.png\" alt=\"\" class=\"wp-image-38142\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence.png 898w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence-300x61.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/persistence-600x122.png 600w\" sizes=\"(max-width: 898px) 100vw, 898px\" \/><figcaption>Persistence mechanism via registry&#8217;s Run key<br \/><\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38209\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/folder\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder.png\" data-orig-size=\"702,324\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"folder\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder-300x138.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder-600x277.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder.png\" alt=\"\" class=\"wp-image-38209\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder.png 702w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder-300x138.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/folder-600x277.png 600w\" sizes=\"(max-width: 702px) 100vw, 702px\" \/><figcaption>Folder view of malicious Electrum application<\/figcaption><\/figure>\n<\/div>\n<h3>Denial of service attacks against ElectrumX servers<\/h3>\n<p>This attack consists of flooding ElectrumX servers on port 50002 or 50001, as can be seen in the following traffic capture:<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38143\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/flood\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood.png\" data-orig-size=\"771,574\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"flood\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood-300x223.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood-600x447.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood.png\" alt=\"\" class=\"wp-image-38143\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood.png 771w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood-300x223.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/flood-600x447.png 600w\" sizes=\"(max-width: 771px) 100vw, 771px\" \/><figcaption>SYN flood attacks observed from packet capture<\/figcaption><\/figure>\n<\/div>\n<p>We also noticed another type of packet shown as <a rel=\"noreferrer noopener\" aria-label=\"TCP Spurious Retransmission (opens in a new tab)\" href=\"https:\/\/blog.packet-foo.com\/2013\/06\/spurious-retransmissions\/\" target=\"_blank\">TCP spurious retransmission<\/a>. This is also known as &#8220;needless retransmission,&#8221; where the receiver had already acknowledged receipt but the initiator sent it again anyway. However, it&#8217;s possible this traffic is a by-product of the SYN flood attacks.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38154\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/spurious\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious.png\" data-orig-size=\"974,409\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"spurious\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious-300x126.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious-600x252.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious.png\" alt=\"\" class=\"wp-image-38154\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious.png 974w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious-300x126.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/spurious-600x252.png 600w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><figcaption>Large amount of spurious retransmission messages seen in traffic capture<\/figcaption><\/figure>\n<\/div>\n<p>The IP address of the lab machine we used to detonate the malware ended up being blacklisted in that same up-to-date <a rel=\"noreferrer noopener\" aria-label=\"list (opens in a new tab)\" href=\"https:\/\/hodlister.co\/electrum-client-blacklist\" target=\"_blank\">list<\/a> of clients attacking the Electrumx servers mentioned above, confirming our <em>temporary<\/em> presence in this botnet.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38149\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/blacklist-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist.png\" data-orig-size=\"635,827\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blacklist\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist-230x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist-461x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist.png\" alt=\"\" class=\"wp-image-38149\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist.png 635w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist-230x300.png 230w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/blacklist-461x600.png 461w\" sizes=\"(max-width: 635px) 100vw, 635px\" \/><figcaption>Infected machine participating in attacks against Electrum nodes<\/figcaption><\/figure>\n<\/div>\n<p>According to our telemetry, this is the distribution of most victims participating in the DDoS during the past few days based on connection attempts to the malware command and control servers.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"38226\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/attachment\/chartgraph\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph.png\" data-orig-size=\"638,408\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"chartgraph\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph-300x192.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph-600x384.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph.png\" alt=\"\" class=\"wp-image-38226\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph.png 638w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph-300x192.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/chartgraph-600x384.png 600w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><figcaption>Telemetry from infected endpoints reaching to the C2<\/figcaption><\/figure>\n<\/div>\n<h3>Ongoing attacks and still more theft on the horizon<\/h3>\n<p>Anyone keeping track of cryptocurrencies knows they&#8217;re in for a wild ride. Determined threat actors exploited a vulnerability in the most popular Bitcoin wallet to create a clever phishing attack that was able to net them over $3 million USD in only a few months. Other criminals will soon take notice.<\/p>\n<p>When Electrum responded to spare more victims from this theft, the criminals retaliated with sustained DDoS attacks. There most likely was some animosity between the two parties, but as the botnet continues to disable legitimate Electrum nodes, rogue ones get promoted to continue the vicious cycle of pushing the fake update and robbing more victims of their cryptocurrency.<\/p>\n<p>People running their own Electrum servers can mitigate the DDoS attacks in different ways. They can set up a cron job to download the <a href=\"https:\/\/hodlister.co\/electrum-client-blacklist\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">list of attacking IP addresses<\/a> and block them. They can also create an <a rel=\"noreferrer noopener\" aria-label=\"iptables (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Iptables\" target=\"_blank\">iptables<\/a> rule to rate-limit the connection attempts on the known ports being attacked.<\/p>\n<p>Electrum wallet users need to update the software to the latest version (3.3.4) from the <a rel=\"noreferrer noopener\" aria-label=\"official repository (opens in a new tab)\" href=\"https:\/\/electrum.org\/#download\" target=\"_blank\">official repository<\/a> and be particularly careful with update or other warning messages that could be disguised phishing attempts.<\/p>\n<p>Malwarebytes detects the malicious wallets for Mac OS X as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/osx-electrumstealer\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">OSX.ElectrumStealer<\/a> and Electrum.Stealer for Windows.<\/p>\n<h3><strong>IOCs <\/strong><\/h3>\n<h4>Malicious Electrum wallet binaries<\/h4>\n<pre class=\"wp-block-preformatted\">137e8925667ff75b1c516a97b5d2d3dd205f9302cdeb190fc68855aee2942c22 1900f4d0a13486f90ff5f82e02d210b8a9db27bca24b88f5de849ef124212f09 1ef6c9d9d3519769749498631532063967fc7d5e8f0fc75e8a3ff66f57dfab22 2747c4e43d2652f3ad039e0dc1bf28f5b136a9ac76a4f57320b08b5905e7c4cd 2cd180e61e36de1be904a02591485ef3321b539cdccca1fd7f1f001770652b14 307d97a38c6bf21903057eec48c4d3957e10c0097fe05d5a203101d22cd79cc3 3610c86975ed943b5065bdc65bfcb4035e58a863cd3192865401bc6a70b023ba 367b620a0a332f693a68230bf21f7036983b7b9e0dee946af5338ed168c16318 36c3140d73fbfb5710438d7c218013bf6fb8736a98dfe002b0d711fbb39aad41 41ff4f112d0a8c4bb20a49f7beb5f36c28455a9cebafa8db75277f54f597d6d4 57f6ef3ea9e497592bdbe9dda201105e0faea8f6668b5701b6b91fbc9e94cd43 634287c65f018e71ed7bebfb5b21e33bcedf08139e3d924178b4cdfaa12d8b34 74c2dcf751796cd209755b4e828b6686b2fb38587163b1cbff1295da2d3f0a8c 87aa1fdf00db2ed94464c2687a0e1011a80af576267c0f88d1216c0cb4d2e310 9a5b1ffbeb562d772dfa2d49e59e0f72557f6111a5e24d6498f88b77a5d8f10a a080444918844e27ff2079b71f20ebd2d1f1836907c854671daa3548dc809e7c b20778f69cc959a16c612e75d21a3668aab11f47f2659c3175da5bd80665e225 c48b7ba2531e4954881388aceb00a2ec36488f1cf70eeb873a97b7cfa32362cb c5afedd8a03d2f49e25fb2c568ede20b0e43a4eeebebd202c98324ead9b82732 df154484a90321407c0e8115df7bf6f598adb6a50255cc58b723db7cc5d3729f e8ef9cbeec7cdc7f58e28274c417457c5c8dcf47f4e8409cb2befe9450d3868b f736c8fa4a21755020ecfce60a53d0a1cfdaa7061fd7be6efd49d74af9b13e02 <\/pre>\n<h4>Fake domains\u200b<br \/><\/h4>\n<pre class=\"wp-block-preformatted\">btc-electrum[.]com<br \/>btcelectrum[.]org<br \/>downloadelectrum[.]com<br \/>downloadelectrum[.]org<br \/>eiectrum[.]net<br \/>electrum[.]bz<br \/>electrumapp[.]org<br \/>electrumapps[.]com<br \/>electrumbase[.]com<br \/>electrumbase[.]net<br \/>electrumbase[.]org<br \/>electrumbitcoin[.]org<br \/>electrumbtc[.]org<br \/>electrumbuild[.]com<br \/>electrumcircle[.]com<br \/>electrumclient[.]org<br \/>electrumcore[.]com<br \/>electrumcore[.]net<br \/>electrumdownload[.]com<br \/>electrumdownload[.]org<br \/>electrume[.]com<br \/>electrume[.]org<br \/>electrumfix[.]com<br \/>electrumget[.]com<br \/>electrumget[.]com <br \/>electrumhub[.]com<br \/>electrumnet[.]com<br \/>electrumofficial[.]com<br \/>electrumopen[.]org<br \/>electrumpgrade[.]com<br \/>electrumsafe[.]org<br \/>electrumsite[.]com<br \/>electrumsource[.]org<br \/>electrumstart[.]org<br \/>electrumtxn[.]com<br \/>electrumupdate[.]com<br \/>electrumupgrade[.]com<br \/>electrumupgrade[.]org<br \/>electrumware[.]com<br \/>electrumware[.]org<br \/>electrumweb[.]net<br \/>getelectrum[.]com<br \/>getelectrum[.]live<br \/>getelectrum[.]org<br \/>goelectrum[.]com<br \/>myelectrum[.]org<\/pre>\n<h4>Attacker Bitcoin addresses <\/h4>\n<pre class=\"wp-block-preformatted\">bc1qhsrl6ywvwx44zycz2tylpexza4xvtqkv6d903q<br \/>bc1q92md7868uun8vplp9te0vaecmxyc5rrphdyvxg<br \/>bc1q7hsnpd794pap2hd3htn8hszdfk5hzgsj5md9lz<br \/>bc1ql0p2lrnnxkxnw52phyq8tjr7elsqtnncad6mfv<br \/>bc1qyjkcthq9whn3e8h9dd26gjr9kd8pxmqdgvajwv<br \/>bc1q9h36cyfnqcxjeuw629kwmnp5a7k5pky8l2kzww<br \/>bc1qvr93mxj5ep58wlchdducthe89hcmk3a4uqpw3c<br \/>bc1qcla39fm0q8ka8th8ttpq0yxla30r430m4hgu3x<br \/>14MVEf1X4Qmrpxx6oASqzYzJQZUwwG7Fb5<br \/>3CrC4UitJqNqdkXY5XbJfCaGnbxHkKNqzL<br \/>31rTt8GePHv8LceXnujWqerUd81U29m857<br \/>1FmxAHft8trWjhRNvDsbjD8JNoSzDX8pfD<\/pre>\n<h4>Fraudulent\/malicious digital certificates (Windows only)<\/h4>\n<pre class=\"wp-block-preformatted\">Name: PRO SOFTS<br \/> Serial Number: 15 8F D7 D2 FB 6E 69 E7 75 AB EE 6E <\/pre>\n<pre class=\"wp-block-preformatted\">Name: EIZ Ltd<br \/> Serial Number: 06 6A F7 6B 79 4F 63 79 3C C0 CA 33 78 6F 07 47 <\/pre>\n<h4>RIG EK payload<\/h4>\n<pre class=\"wp-block-preformatted\">9296b210b782faecca8394b2bd7bf720ffa5c122b83c4ed462ba25d3e1b8ce9a<\/pre>\n<h4>transactionservices.exe (Electrum wallet)<\/h4>\n<pre class=\"wp-block-preformatted\">c3a7cf30428689a44328090b994ce593bbf2a68141fcbefb899dee4fec336198<\/pre>\n<h4>IPs (Electrum wallet host and configs) <\/h4>\n<pre class=\"wp-block-preformatted\">178.159.37[.]113  <br \/>194.63.143[.]226  <br \/>217.147.169[.]179<br \/>188.214.135[.]174  <\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/\">Electrum Bitcoin wallets under siege<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 16 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/' title='Electrum Bitcoin wallets under siege'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_1164390316.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Threat actors are relentlessly phishing and attacking Electrum Bitcoin wallet users, racking up millions of dollars.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoin\/\" rel=\"tag\">bitcoin<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitcoins\/\" rel=\"tag\">bitcoins<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/botnet\/\" rel=\"tag\">botnet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ddos\/\" rel=\"tag\">ddos<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/electrum\/\" rel=\"tag\">Electrum<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploits\/\" rel=\"tag\">exploits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig\/\" rel=\"tag\">RIG<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rig-ek\/\" rel=\"tag\">RIG EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vulnerabilities\/\" rel=\"tag\">vulnerabilities<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wallet\/\" rel=\"tag\">wallet<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/' title='Electrum Bitcoin wallets under siege'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/04\/electrum-bitcoin-wallets-under-siege\/\">Electrum Bitcoin wallets under siege<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10490,14719,10410,4503,10514,21568,10534,10987,11589,11792,10510,10752,14646],"class_list":["post-15103","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bitcoin","tag-bitcoins","tag-botnet","tag-cybercrime","tag-ddos","tag-electrum","tag-exploit-kit","tag-exploits","tag-rig","tag-rig-ek","tag-social-engineering","tag-vulnerabilities","tag-wallet"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15103"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15103\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15103"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}