Fake Zoom link triggers million-dollar level Crypto Assets theft Hacker funding flow exposed

Fake Zoom Meeting Link Triggers Massive Crypto Assets Theft Incident

Recently, several users reported a phishing attack disguised as a Zoom meeting link. One victim lost up to a million dollars in Crypto Assets after clicking on the malicious link and installing software. In response to this incident, the security team conducted an in-depth analysis and tracked the flow of funds from the hackers.

Link Analysis

Hackers use domain names similar to "app.us4zoom.us" to disguise themselves as legitimate Zoom meeting links. The page closely resembles the actual Zoom meeting interface, and when users click the "Start Meeting" button, it triggers the download of a malicious installation package instead of launching the local Zoom client.

By probing the domain, the address of the hacker's monitoring logs was discovered. After decryption, it was found that this is a log of attempts to send messages via the Telegram API, using the Russian language. The site has been online for 27 days, the hacker may be Russian, and has been looking for targets to deploy malware since November 14, then monitoring whether the target clicks the download button on the phishing page through the Telegram API.

Losses Exceeding $1 Million, Fake Zoom Meeting Phishing Analysis

Malware Analysis

The malicious installation package is named "ZoomApp_v.3.14.dmg". When opened, it will诱导 the user to execute the malicious script ZoomApp.file in Terminal and require inputting the local machine password.

After decoding the execution content of the malicious file, it was found to be a malicious osascript script. This script searches for and runs a hidden executable file named ".ZoomApp". Disk analysis of the original installation package indeed revealed this hidden executable file.

Loss exceeds 1 million USD, analysis of fake Zoom meeting phishing

Loss exceeds 1 million USD, fake Zoom meeting phishing analysis

Malicious Behavior Analysis

Static Analysis

Upload the binary file to the threat intelligence platform for analysis, which has been flagged as malicious. Through static disassembly analysis, it was found that the entry code is used for data decryption and script execution. The data portion is mostly encrypted and encoded.

After decryption, it was found that the binary file ultimately executes a malicious osascript that collects user device information and sends it to the backend. The script enumerates different plugin ID path information, reads computer KeyChain information, collects system information, browser data, Crypto Assets wallet data, Telegram data, Notes data, and Cookie data, etc.

The collected information will be compressed and sent to servers controlled by hackers. Since the malware induces users to enter their passwords while running and collects KeyChain data, hackers may obtain users' wallet mnemonics, private keys, and other sensitive information, thereby stealing assets.

The IP address of the hacker's server is located in the Netherlands and has been flagged as malicious by the threat intelligence platform.

Loss exceeding 1 million dollars, analysis of fake Zoom meeting phishing

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Loss over $1 million, fake Zoom meeting phishing analysis

Loss over 1 million USD, fake Zoom meeting phishing analysis

Loss over $1 million, Fake Zoom Meeting Phishing Analysis

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Loss of over 1 million USD, fake Zoom meeting phishing analysis

Loss exceeding 1 million dollars, fake Zoom meeting phishing analysis

Loss exceeding 1 million USD, fake Zoom meeting phishing analysis

Loss exceeds 1 million USD, fake Zoom meeting phishing analysis

Loss of over 1 million USD, analysis of fake Zoom meeting phishing

Losses Exceeding $1 Million, Fake Zoom Meeting Phishing Analysis

Loss exceeds 1 million dollars, fake Zoom meeting phishing analysis

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Dynamic Analysis

Dynamically execute the malicious program in a virtual environment and analyze the process, observing that the malicious program collects local data and sends data to the backend's process monitoring information.

Losses Exceeding $1 Million, Fake Zoom Meeting Phishing Analysis

Fund Flow Analysis

Analysis of the hacker address provided by the victim reveals that the hacker profited over 1 million USD, including USD0++, MORPHO, and ETH. Among them, USD0++ and MORPHO were exchanged for 296 ETH.

The hacker address previously received small ETH transfers, suspected to be for providing transaction fees. The source address transferred small amounts of ETH to nearly 8,800 addresses, possibly being a "platform specifically providing transaction fees."

296.45 ETH from the stolen funds has been transferred to a new address. This address is involved in multiple chains, and the current balance is 32.81 ETH. The main ETH transfer paths include transferring to multiple addresses, partially exchanging for USDT, and transferring to exchanges such as Gate.

These extended addresses are associated with multiple trading platforms such as Bybit, Cryptomus.com, Swapspace, Gate, and MEXC for future transfers, and are linked to several addresses marked as Angel Drainer and Theft. Some ETH still remains on a certain address.

USDT transaction traces show that funds were transferred to platforms such as Binance, MEXC, and FixedFloat.

Loss exceeds 1 million USD, fake Zoom meeting phishing analysis

Loss over 1 million USD, analysis of fake Zoom meeting phishing

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Loss exceeds 1 million dollars, analysis of fake Zoom meeting phishing

Loss over 1 million USD, analysis of fake Zoom meeting phishing

Loss over 1 million dollars, fake Zoom meeting phishing analysis

Loss exceeds 1 million dollars, fake Zoom meeting phishing analysis

Security Recommendations

This type of attack combines social engineering attacks and Trojan attack techniques, and users need to be particularly vigilant. It is recommended to carefully verify the meeting link before clicking, avoid executing software and commands from unknown sources, install antivirus software, and update it regularly. Users can refer to relevant safety manuals to enhance their awareness of network security and protection capabilities.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 4
  • Share
Comment
0/400
consensus_whisperervip
· 9h ago
Classic! Another one of those old tricks.
View OriginalReply0
DegenRecoveryGroupvip
· 9h ago
It's an IQ tax, isn't it? Who asked you to click?
View OriginalReply0
DefiSecurityGuardvip
· 9h ago
*sigh* another day, another exploit vector... classic social engineering through domain spoofing. ngmi if you're still falling for these
Reply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)