市值: $3.3646T 0.850%
體積(24小時): $107.4504B -22.260%
  • 市值: $3.3646T 0.850%
  • 體積(24小時): $107.4504B -22.260%
  • 恐懼與貪婪指數:
  • 市值: $3.3646T 0.850%
加密
主題
加密植物
資訊
加密術
影片
頭號新聞
加密
主題
加密植物
資訊
加密術
影片
bitcoin
bitcoin

$106900.362344 USD

0.81%

ethereum
ethereum

$2539.350639 USD

-0.90%

tether
tether

$1.000181 USD

0.00%

xrp
xrp

$2.355654 USD

-1.42%

bnb
bnb

$651.274881 USD

0.03%

solana
solana

$168.837259 USD

-1.00%

usd-coin
usd-coin

$0.999858 USD

-0.01%

dogecoin
dogecoin

$0.228762 USD

0.62%

cardano
cardano

$0.745002 USD

-0.36%

tron
tron

$0.269741 USD

0.78%

sui
sui

$3.835781 USD

-0.99%

chainlink
chainlink

$15.762179 USD

-2.73%

avalanche
avalanche

$22.438476 USD

-0.40%

stellar
stellar

$0.287075 USD

-0.30%

hyperliquid
hyperliquid

$26.277397 USD

-2.29%

加密貨幣新聞文章

procol的中國打印機製造商分發了被竊取比特幣的惡意軟件污染的駕駛員

2025/05/21 03:05

該信息是在本週由亞洲國家媒體報導的,並表明9.3 BTC被盜。

procol的中國打印機製造商分發了被竊取比特幣的惡意軟件污染的駕駛員

A Chinese printer manufacturer has reportedly distributed drivers contaminated with malware that steals Bitcoin, according to local reports.

據當地報導稱,據報導,一家中國打印機製造商已分發了被竊取比特幣的惡意軟件污染的駕駛員。

The company, Procolored, is said to have used a USB flash drive to upload the virus-compromised software to a cloud storage service for global download, reports Landian News. In this case, a worm malware and a trojan called Foxif were sent. This episode also adds to a Binance study that exposes critical vulnerabilities in crypto security.

據Landian News報導,據說該公司已使用USB Flash驅動器將病毒功能障礙軟件上傳到雲存儲服務以供全球下載。在這種情況下,發送了蠕蟲惡意軟件和一個名為Foxif的特洛伊木馬。這一集還增加了一項Binance研究,該研究暴露了加密安全性的關鍵漏洞。

According to MistTrack, the malware diverted 9.3 BTC, just under $1 million at the time of this edition. The Bitcoins were sent to the wallet involved in the attack, as “the official driver provided by this printer loads a backdoor program. It hijacks the wallet address in the user’s clipboard and replaces it with the attacker’s address.”

根據Misttrack的說法,該版本時,惡意軟件轉移了9.3 BTC,不到100萬美元。比特幣被發送到襲擊中涉及的錢包,因為“該打印機提供的官方驅動程序加載了後門程序。它劫持了用戶剪貼板中的錢包地址,並用攻擊者的地址代替了。”

The malware’s action occurs when the user copies the address, which is modified by the virus before sending. In this case, the transfer ends up being made to the wallet involved in the attack.

當用戶複製地址時,惡意軟件的操作發生,該地址在發送前由病毒修改。在這種情況下,轉移最終是將襲擊所涉及的錢包進行的。

Company Acknowledges Infection After YouTuber Discovery

公司確認YouTuber發現後感染

Tiansheng Printer acknowledged the infection, stated that it deleted the infected drivers, and checked all files on May 8.

Tiansheng打印機承認了感染,並指出它刪除了受感染的驅動程序,並於5月8日檢查了所有文件。

However, the manufacturer’s acknowledgment reportedly came after the insistence of YouTuber Cameron Coward, who discovered the malware. It started when he installed the software of a Procolored UV printer and was alerted by an antivirus.

但是,據報導,製造商的承認是在發現了惡意軟件的YouTuber Cameron Coward的堅持之後。它始於他安裝了Procoled UV打印機的軟件,並由防病毒軟件提醒。

Coward reported that he notified Tiansheng, which blamed his antivirus. Dissatisfied, the YouTuber said he sought help on a Reddit forum and ended up attracting the attention of security company G-Data.

Coward報告說,他通知了Tiansheng,這歸咎於他的防病毒軟件。 YouTuber不滿意,他在Reddit論壇上尋求幫助,並最終吸引了安全公司G-DATA的注意。

G-Data’s analysis revealed that the drivers were contaminated with a backdoor called Win32.Backdoor.XRedRAT.A and a cryptocurrency thief based on .NET. In this case designed to swap addresses in the clipboard.

G-DATA的分析表明,駕駛員被稱為Win32.backdoor.xredrat.a的後門污染,並且基於.NET的加密貨幣小偷。在這種情況下,旨在交換剪貼板中的地址。

The security company advised users to carefully check the system and scan. If possible, to reinstall the printer driver, which must be obtained by direct contact with Tiansheng technical support.

安全公司建議用戶仔細檢查系統和掃描。如果可能的話,要重新安裝打印機驅動程序,必須通過直接與Tiansheng的技術支持來獲得。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年05月21日 其他文章發表於