Ethereum developer exposes phishing scam using fake StreamYard domain

来源 Cryptopolitan

Ethereum core developer Zak Cole was recently targeted in a phishing scheme, where the attacker disguised a link as an invitation to appear on a podcast. According to Zak, the attempt relied on fake domains and a malicious installer to steal crypto credentials and data from his computer. 

Cole wrote a 21-post X thread late Monday, starting with how the scam began with a direct message on X inviting him to “Join our podcast!”

The sender, using the handle @0xMauriceWang on the social platform, posed as a representative of Blockwork’s Empire podcast and followed up with an email from what Zak said looked like “a legitimate podcast domain.”

Phisher tried to ‘help’ Zak install malicious app

According to the Ether core dev, the email included a link displayed as streamyard.com but was actually hyperlinked to streamyard.org. When Cole clicked, the page returned an “error joining” message and instructed him to download a desktop application to continue.

Scammer text to Zak Cole. Source: Zak.eth X account

In the screenshots Cole shared on his X thread, he declined making the installation at first because of his company’s security policies, but the attacker begged him to add it “just this once,” even sending a video tutorial to demonstrate how to install the supposed app. 

“Mate, it’s StreamYard, they have over 3 mil users. I have a corp laptop too, but it’s all good. The browser version barely works, maybe 1 out of 20 attempts actually connects. I’m pretty sure they keep it around as marketing, but in practice everyone ends up using the desktop app. Way more stable…” the message read.

That was when Cole saw “red flags everywhere,” and downloaded the package onto a controlled lab machine instead of his work computer. 

Inside the DMG file, he found a hidden Mach-O binary named “.Streamyard,” a Bash loader, and a fake Terminal icon meant to trick users into dragging it to gain system-level access.

He described the loader as a “Russian nesting doll of bullshit,” explaining how it concatenated base64 fragments, decrypted them with a key, re-encoded the result, and executed it. Each step was intended to evade antivirus detection.

“Decoded offline, Stage2 was AppleScript that would find the mounted volume, copy .Streamyard to /tmp/.Streamyard, strip quarantine with xattr -c, chmod +x, then execute. Silent, surgical, and deadly,” the dev explained, jotting down the line of code.

Cole added that if a victim disabled macOS Gatekeeper or fell for the phishing Terminal drag trick, the malware would have silently exfiltrated everything, including passwords, crypto wallets, emails, messages, and photos.

Conversation with the attacker reveals hired malware services

Instead of shutting the operation down, Cole joined a live call with the scammer after asking them to help, who appeared nervous and read from a script while trying to guide him through the fake installation. 

During the video call session, the Ether programmer began screen-sharing, scrolling through a folder of explicit Kim Jong Un videos to throw the attacker off balance.

As he pressed for answers on why it wasn’t working, the scammer admitted he was not part of a state-backed operation, but was in an active community of hackers that had rented a phishing kit for about $3,000 a month. 

Cole noted the attacker used colloquialisms such as “mate” to trick victims into thinking he was based in the United Kingdom or close to the United States. The attacker also revealed that he did not control the infrastructure directly and could not manage the payload domains, and he was using a “budget cybercrime as a service.”

According to crowdsourced security intelligence firm VirusTotal’s findings, the delivery infrastructure they used was lefenari.com, which hosted payloads through scripted endpoints, and streamyard.org, as a lure. Both domains are now disabled, with assistance from cybersecurity firm Security Alliance.

The smartest crypto minds already read our newsletter. Want in? Join them.

免责声明:仅供参考。 过去的表现并不预示未来的结果。
placeholder
2024年「鲍威尔国会山之旅」落幕,美联储「鸽派」当头,华尔街欢呼!最近两天,鲍威尔的国会证词释放「鸽派」信号,缓解了市场近来持续推迟降息的担忧。风险资产迎喜讯,殖利率和美元节节下行,黄金八连涨至历史新高。
作者  Esteban Ma
2024 年 3 月 08 日
最近两天,鲍威尔的国会证词释放「鸽派」信号,缓解了市场近来持续推迟降息的担忧。风险资产迎喜讯,殖利率和美元节节下行,黄金八连涨至历史新高。
placeholder
白银价格突破90美元再创新高!2026年有望涨至300美元?花旗、瑞银看涨白银2026年内涨至100美元/盎司,美国银行甚至不排除突破300美元。
作者  Alison Ho
1 月 14 日 周三
花旗、瑞银看涨白银2026年内涨至100美元/盎司,美国银行甚至不排除突破300美元。
placeholder
澳洲央行加息25基点,澳元汇率狂飙!未来走势如何?澳洲央行2026年内大概率会再次加息,澳元/美元涨势或延续。
作者  Alison Ho
2 月 03 日 周二
澳洲央行2026年内大概率会再次加息,澳元/美元涨势或延续。
placeholder
【财经纵览】:恐慌加剧!美股、贵金属全线下挫、纳指三连跌!比特币、以太坊双双跌超10%!周四(2月5日)市场对软件板块和加密货币的抛售进一步加剧,并向整个市场蔓延。引发本周软件股大抛售的美国AI明星公司Anthropic发布擅长金融研究的新人工智能模型Claude Opus4.6,该消息发布后,金融服务公司股价盘中应声下跌。另外,美国劳动力市场数据疲软令美国经济前景受挫。美国12月职位空缺意外下降至2020年以来的最低水平;挑战者裁员人数创下自2009年衰退最严重时期以来的1月最高纪录。
作者  Insights
昨日 00: 43
周四(2月5日)市场对软件板块和加密货币的抛售进一步加剧,并向整个市场蔓延。引发本周软件股大抛售的美国AI明星公司Anthropic发布擅长金融研究的新人工智能模型Claude Opus4.6,该消息发布后,金融服务公司股价盘中应声下跌。另外,美国劳动力市场数据疲软令美国经济前景受挫。美国12月职位空缺意外下降至2020年以来的最低水平;挑战者裁员人数创下自2009年衰退最严重时期以来的1月最高纪录。
placeholder
美股OR黄金?下周非农或成重中之重!纳斯达克100迎两大关键美国科技股全线崩跌!黄金止跌企稳;下周非农成重中之重,美联储在降息与缩表中或优先考虑降息;纳斯达克100指数技术分析:关注中期关键点位23800,2月12日前后
作者  Insights
21 小时前
美国科技股全线崩跌!黄金止跌企稳;下周非农成重中之重,美联储在降息与缩表中或优先考虑降息;纳斯达克100指数技术分析:关注中期关键点位23800,2月12日前后
goTop
quote