Revealed by Harry Denley, a security and anti-phishing expert, on Monday, the vulnerable codes are collecting credentials of major crypto platforms, including Binance, MyCryptoWallet, and many others.
Extension-native wallet create also sends secrets to their backend!
Bad guys: erc20wallet[.]tk
ExtensionID: ckkgmccefffnbbalkmbbgebbojjogffn pic.twitter.com/TE2iw5d8Md
— harrydenley.eth ◊ (@sniko_) December 31, 2019
Public Mint Teams Up with KIRA to Enable Cross-Chain Liquid StakingGo to article >>
The malicious codes send all the data to a remote server identified as “erc20wallet.tk.” The top-level domain belongs to a group of the south pacific island territory of New Zealand called Tokelau.
A suspiciously named wallet indeed
Designed to hold Ethereum and other ERC-20 tokens, the company claims that it has over 2,000 users. The platform basically operates as browser extensions, even though per the company, there is a desktop application for Windows.
“It is a web wallet which has several extensions for different browsers,” a blog post by the company explained.
Meanwhile, many browser extensions were found in the past with malicious codes. However, most of those were illegally mining digital currencies on victims’ computers.
Most recently, Google banned widely used Ethereum wallet and DApp browser MetaMask for violating its financial policy from Play Store. Though not specified, the tech giant indicated the crypto mining feature, which is strictly bans in its policy. Notably, the platform does not offer any crypto mining services to its users.