Ambient Finance website hacked, team warns users to wait for fix

As a seasoned cybersecurity researcher with over two decades of experience under my belt, I can’t help but feel a sense of deja vu when I hear about yet another sophisticated malware attack. The Ambient Finance hack is just the latest reminder that no system is truly invulnerable, not even Apple’s seemingly impenetrable macOS.


On October 17th, the interface of Ambient Finance’s decentralized trading platform experienced a security breach. The team has cautioned users against engaging with the website, linking wallets, or validating transactions until further notice.

As reported by Ambient Finance, their website domain has been subject to a hacking attempt. However, it’s important to note that this incident is considered isolated. The team wants to assure all customers that the agreements and financial resources associated with Ambient are secure and unaffected.

After the hack, Ambient Finance successfully regained control of their domain. However, they’re now awaiting DNS updates and propagation before it can be fully functional again. Representatives from Ambient advise users to exercise patience and only interact with the website once they receive an “all clear” signal.

Security company Blockaid disclosed that the notorious Inferno Drainer malware, which is employed for stealing digital assets, was involved in the cyber attack. Furthermore, they pointed out that the command and control (C2) server responsible for executing the attack was set up a full day before the incident occurred.

Ambient Finance website hacked, team warns users to wait for fix

Respect every click: malware becomes more sophisticated

It’s regrettable that the Ambient Finance hack isn’t an isolated incident, as cyber-attacks are growing more complex. Contrary to previous assumptions, it seems that Apple’s macOS is not entirely impervious to such threats.

Lately, there’s been an increase in malicious software aimed at macOS operating systems. Last August, a novel type of malware named “Cthulhu Stealer” was uncovered by cybersecurity experts.

As a researcher, I’ve uncovered a cunning malware I’ve dubbed “Cthulhu Stealer.” This insidious software masquerades as a legitimate macOS application, often found on your desktop. Once installed, it covertly gathers sensitive data and private keys, including those tied to crypto wallets, leaving them drained in the process.

In September, security experts from McAfee Labs found a type of malware for Android devices dubbed “SpyAgent.” This malicious software utilizes optical character recognition technology to sift through images and pilfer confidential data hidden within them, such as photos of private keys.

SpyAgent spread through text message links that initiated downloads of seemingly harmless applications, which were just disguised versions of the malware. Researchers at McAfee identified over 280 fraudulent applications all tied to SpyAgent.

A cybersecurity company, Facct, has recently discovered an innovative approach for spreading malware: it employs automated emails to deploy altered XMrig mining software. This tweaked version of the original software enables malicious entities to mine digital currencies by exploiting the devices of unsuspecting victims.

Read More

2024-10-17 19:29