HomeMalware & ThreatsCrazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

Published on

spot_img

A cybercrime gang known as Crazy Evil, operating primarily in Russian-speaking circles, has been implicated in more than 10 ongoing social media scams designed to deceive and defraud victims. These scams utilize a variety of tactics to trick individuals into unwittingly installing malicious software, including well-known malware like StealC, Atomic macOS Stealer (also known as AMOS), and Angel Drainer.

Recorded Future’s Insikt Group conducted an analysis of Crazy Evil’s activities and discovered that the group specializes in identity theft, cryptocurrency theft, and the distribution of information-stealing malware. The gang employs a network of “traffers,” or social engineering experts, to redirect legitimate web traffic to malicious phishing pages. This diverse arsenal of malware suggests that Crazy Evil targets both Windows and macOS users, posing a threat to the decentralized finance ecosystem.

Crazy Evil has been operational since at least 2021 and primarily operates as a traffer team focused on redirecting legitimate web traffic to malicious landing pages controlled by other criminal organizations. The group is purportedly led by a threat actor known as @AbrahamCrazyEvil on Telegram, with over 4,800 subscribers on the messaging platform at the time of writing. Sekoia, a French cybersecurity company, highlighted the monetization of traffic by Crazy Evil, with botnet operators using the redirected traffic to compromise users’ devices.

Unlike other scams that involve setting up fake online stores to facilitate fraudulent transactions, Crazy Evil’s scams revolve around the theft of digital assets such as non-fungible tokens (NFTs), cryptocurrencies, payment cards, and online banking accounts. The group is estimated to have generated over $5 million in illicit revenue and compromised tens of thousands of devices worldwide.

The recent exposure of Crazy Evil comes in the wake of exit scams perpetuated by other cybercrime groups such as Markopolo and CryptoLove. These groups were previously involved in a ClickFix campaign using fake Google Meet pages. Crazy Evil specifically targets the cryptocurrency space with tailor-made spear-phishing tactics, investing significant time in reconnaissance to identify and engage with potential targets.

In addition to orchestrating sophisticated attack chains that deploy information-stealing malware and wallet-draining software, Crazy Evil’s administrators offer instruction manuals, guidance for traffickers, and crypter services for malicious payloads. The group boasts an affiliate structure to delegate operations efficiently.

Crazy Evil’s operations are intertwined with the use of Telegram, with newly recruited affiliates directed by a Telegram bot to various private channels for different purposes. The group comprises six sub-teams, each specializing in a specific scam aimed at deceiving victims into installing malicious tools from counterfeit websites.

As Crazy Evil continues to expand its criminal activities, it is likely that other cybercrime entities will adopt similar tactics, necessitating constant vigilance from security teams to prevent widespread breaches across various sectors. The group’s use of compromised WordPress sites and other distribution channels underscores the need for robust cybersecurity measures to protect against evolving threats posed by such groups.

Source link

Latest articles

Zscaler Aims to Mitigate AI Identity Risk Through Symmetry Acquisition

Startup Symmetry Systems Maps Relationships Across AI, SaaS, and Cloud Assets Zscaler, a prominent player...

Russia Hacks Bluesky Accounts to Spread Disinformation About Ukraine

Russian Hackers Target Bluesky with Sophisticated Disinformation Campaign In a concerning development for online security...

First VPN Dismantled in Global Takedown Used by 25 Ransomware Groups

Authorities across Europe and North America have successfully dismantled "First VPN," a criminal virtual...

World Cup Phishing Surge Identifies 203 Malicious IPs

Surge in Phishing Activities Ahead of the 2026 FIFA World Cup Recent research has found...

More like this

Zscaler Aims to Mitigate AI Identity Risk Through Symmetry Acquisition

Startup Symmetry Systems Maps Relationships Across AI, SaaS, and Cloud Assets Zscaler, a prominent player...

Russia Hacks Bluesky Accounts to Spread Disinformation About Ukraine

Russian Hackers Target Bluesky with Sophisticated Disinformation Campaign In a concerning development for online security...

First VPN Dismantled in Global Takedown Used by 25 Ransomware Groups

Authorities across Europe and North America have successfully dismantled "First VPN," a criminal virtual...