May 31, 2021 By David Bisson 2 min read

Digital attackers are leveraging ads on the Telegram messenger app to target cryptocurrency owners with samples of HackBoss malware. One notable element of this campaign is that it’s targeting people who want to make a buck through sketchy means themselves. Read on to learn how the HackBoss actors are tricking wanna-be attackers via their own Telegram messenger channel.

Avast found over 100 cryptocurrency wallet addresses belonging to the malware family’s creators. Together, those wallets contained a collective total of over $560,000 at the time of analysis.

The actual amount stolen by HackBoss could be less, however. The security firm found that some of those wallet addresses were also associated with scams designed to trick users into buying fake software. This could be a sign that HackBoss’s handlers used the same cryptocurrency wallet addresses to conduct other campaigns.

Become a HackBoss… by Getting Infected Yourself

The malware actors used a Telegram messenger channel called HackBoss. There, they advertised applications claiming to be “the best software for hackers (hack bank / dating / bitcoin).”

But they never were. These fake cracking applications contained a link to an encrypted or anonymous file storage to download the software as a .zip file. When opened, the file ran a .exe that displayed a simple interface. Clicking on any of the buttons caused the campaign to decrypt and execute its malicious payload. It also led the campaign to trigger the malware every minute using a scheduled task and at startup using a registry key.

Once active, HackBoss regularly checked the clipboard content for anything resembling a cryptocurrency wallet address. When it found that format, the malware replaced the wallet with one of its own in an attempt to steal users’ cryptocurrency.

The creators of HackBoss didn’t just use the Telegram messenger channel to promote their malware. They also relied on a website containing promotional blog posts, YouTube channels with promo videos and advertisements on public forums and other websites.

Not the Only Threat Involving Telegram Messenger

HackBoss wasn’t the only malware campaign that recently involved Telegram. In October 2020, for instance, G Data Software wrote that attackers could control a new threat called T-RAT 2.0 using text-based commands over the Telegram messenger. This malware enabled anyone who controlled it to steal passwords, make off with cryptocurrency using clipboard information and capture screenshots.

Several months later, a malicious ad led users to a fake Windows desktop version of Telegram. The cloned Telegram messenger websites ultimately led the campaign to drop samples of the AZORult infostealer.

In April Check Point Research uncovered ToxicEye, a remote access trojan. Digital attackers relied on phishing emails to spread a malicious .exe. Once activated, the malware stole data, deleted files and/or encrypted data.

How to Defend Against Malware like HackBoss

Attacks like this underscore the need for organizations and users alike to exercise caution around cryptocurrency. As part of that effort, they need to confirm the wallet address to which they’re sending money. They also might consider setting up multi-factor authentication (MFA) as a means of preventing attackers from stealing access to their accounts.

More from News

Recent CrowdStrike outage: What you should know

3 min read - On Friday, July 19, 2024, nearly 8.5 million Microsoft devices were affected by a faulty system update, causing a major outage of businesses and services worldwide. This equates to nearly 1% of all Microsoft systems globally and has led to significant disruptions to airlines, police departments, banks, hospitals, emergency call centers and hundreds of thousands of other private and public businesses. What caused this outage in Microsoft systems? The global outage of specific Microsoft-enabled systems and servers was isolated to…

White House mandates stricter cybersecurity for R&D institutions

2 min read - Federal cyber regulation is edging further into research and development (R&D) and higher education. A recent memo from the Office of Science and Technology Policy (OSTP) states that certain covered institutions will be required to implement cybersecurity programs for R&D security. These mandates will also apply to institutions of higher education that support R&D. Beyond strengthening the overall U.S. security posture, this move is also in direct response to growing threats posed by the People's Republic of China (PRC), as…

New memo reveals Biden’s cybersecurity priorities through fiscal year 2026

2 min read - On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026. Key highlights from the FY26 memorandum In the latest annual version…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today