Disclaimer: Information found on CryptoreNews is those of writers quoted. It does not represent the opinions of CryptoreNews on whether to sell, buy or hold any investments. You are advised to conduct your own research before making any investment decisions. Use provided information at your own risk.
CryptoreNews covers fintech, blockchain and Bitcoin bringing you the latest crypto news and analyses on the future of money.
FBI Alerts to North Korean Cybercriminals Employing Android Malware for Cryptocurrency Key Theft

The FBI has released a caution regarding an advanced new Android malware known as SpyAgent, identified by McAfee, which aims to extract cryptocurrency private keys from users’ mobile devices.
SpyAgent focuses on private keys by utilizing optical character recognition (OCR) technology to scan and retrieve text from screenshots and images saved on the device.
According to McAfee’s findings, SpyAgent is disseminated through harmful links sent via SMS.
Malware Disguised as Various Applications
When users engage with these links, they are redirected to seemingly authentic websites that encourage them to download an application masquerading as a reliable program.
In truth, this application is the SpyAgent malware, which jeopardizes the security of the phone once it is installed.
The malware pretends to be different types of applications, including banking software, government services, and streaming sites.
Upon installation, it seeks permissions to access contacts, messages, and local storage, aiding in the extraction of sensitive information.
McAfee indicates that SpyAgent has been found in over 280 fraudulent applications and is mainly targeting users in South Korea.
This warning follows another malware threat identified in August.
The “Cthulhu Stealer,” which impacts MacOS systems, similarly camouflages itself as legitimate software and aims at personal data, including MetaMask passwords, IP addresses, and cold wallet private keys.
That same month, Microsoft discovered a vulnerability in Google Chrome, which was exploited by the North Korean hacker group Citrine Sleet to create counterfeit cryptocurrency exchanges and fraudulent job postings.
These actions resulted in the installation of remote-controlled malware that also pilfered private keys.
The vulnerability in Chrome has since been addressed, but the increase in such cyberattacks has led the FBI to issue an official warning regarding North Korean hacking operations.
Users are encouraged to stay alert and refrain from downloading applications or clicking on links from unverified sources to safeguard their digital assets against these advanced threats.
Crypto Projects Lost $310M to Scams in August
As reported, August experienced a spike in crypto-related scams, with an astonishing $310 million lost to various exploits, marking it as the second-highest monthly total this year.
However, $10.3 million of the stolen funds were ultimately recovered or returned, resulting in a net loss of $300.6 million.
Phishing incidents emerged as the most detrimental, accounting for roughly $293 million of the overall losses.
Two particularly significant phishing attacks led to the theft of $238 million in Bitcoin and $55 million in DAI stablecoin.
In addition to phishing, other notable losses in August included attacks on several crypto projects.
For example, the Ronin Network, an Ethereum Virtual Machine (EVM)-based sidechain, was compromised by a white hat hacker on August 6, resulting in the theft of 4,000 ETH, valued at $9.85 million at that time.
Moreover, flash loan attacks, while still concerning, resulted in comparatively lower losses of $1.2 million in August compared to earlier months.
In contrast to the increase in phishing and other forms of exploitation, exit scams saw a marked decline, with losses falling to $800,000 in August, down from approximately $3 million in July.
The post FBI Warns of North Korean Hackers Using Android Malware to Steal Crypto Keys appeared first on Cryptonews.