Ethereum developer exposes phishing scam using fake StreamYard domain

来源 Cryptopolitan

Ethereum core developer Zak Cole was recently targeted in a phishing scheme, where the attacker disguised a link as an invitation to appear on a podcast. According to Zak, the attempt relied on fake domains and a malicious installer to steal crypto credentials and data from his computer. 

Cole wrote a 21-post X thread late Monday, starting with how the scam began with a direct message on X inviting him to “Join our podcast!”

The sender, using the handle @0xMauriceWang on the social platform, posed as a representative of Blockwork’s Empire podcast and followed up with an email from what Zak said looked like “a legitimate podcast domain.”

Phisher tried to ‘help’ Zak install malicious app

According to the Ether core dev, the email included a link displayed as streamyard.com but was actually hyperlinked to streamyard.org. When Cole clicked, the page returned an “error joining” message and instructed him to download a desktop application to continue.

Scammer text to Zak Cole. Source: Zak.eth X account

In the screenshots Cole shared on his X thread, he declined making the installation at first because of his company’s security policies, but the attacker begged him to add it “just this once,” even sending a video tutorial to demonstrate how to install the supposed app. 

“Mate, it’s StreamYard, they have over 3 mil users. I have a corp laptop too, but it’s all good. The browser version barely works, maybe 1 out of 20 attempts actually connects. I’m pretty sure they keep it around as marketing, but in practice everyone ends up using the desktop app. Way more stable…” the message read.

That was when Cole saw “red flags everywhere,” and downloaded the package onto a controlled lab machine instead of his work computer. 

Inside the DMG file, he found a hidden Mach-O binary named “.Streamyard,” a Bash loader, and a fake Terminal icon meant to trick users into dragging it to gain system-level access.

He described the loader as a “Russian nesting doll of bullshit,” explaining how it concatenated base64 fragments, decrypted them with a key, re-encoded the result, and executed it. Each step was intended to evade antivirus detection.

“Decoded offline, Stage2 was AppleScript that would find the mounted volume, copy .Streamyard to /tmp/.Streamyard, strip quarantine with xattr -c, chmod +x, then execute. Silent, surgical, and deadly,” the dev explained, jotting down the line of code.

Cole added that if a victim disabled macOS Gatekeeper or fell for the phishing Terminal drag trick, the malware would have silently exfiltrated everything, including passwords, crypto wallets, emails, messages, and photos.

Conversation with the attacker reveals hired malware services

Instead of shutting the operation down, Cole joined a live call with the scammer after asking them to help, who appeared nervous and read from a script while trying to guide him through the fake installation. 

During the video call session, the Ether programmer began screen-sharing, scrolling through a folder of explicit Kim Jong Un videos to throw the attacker off balance.

As he pressed for answers on why it wasn’t working, the scammer admitted he was not part of a state-backed operation, but was in an active community of hackers that had rented a phishing kit for about $3,000 a month. 

Cole noted the attacker used colloquialisms such as “mate” to trick victims into thinking he was based in the United Kingdom or close to the United States. The attacker also revealed that he did not control the infrastructure directly and could not manage the payload domains, and he was using a “budget cybercrime as a service.”

According to crowdsourced security intelligence firm VirusTotal’s findings, the delivery infrastructure they used was lefenari.com, which hosted payloads through scripted endpoints, and streamyard.org, as a lure. Both domains are now disabled, with assistance from cybersecurity firm Security Alliance.

The smartest crypto minds already read our newsletter. Want in? Join them.

免责声明:仅供参考。 过去的表现并不预示未来的结果。
placeholder
【今日市场前瞻】美国“恐怖数据”来袭!黄金冲向3700美元美国“恐怖数据”来袭!市场或迎波动;黄金冲向3700美元,再创历史新高!欧元/美元大涨站上1.18>>
作者  Alison Ho
7 小时前
美国“恐怖数据”来袭!市场或迎波动;黄金冲向3700美元,再创历史新高!欧元/美元大涨站上1.18>>
placeholder
欧元兑美元汇率有望突破1.20?美联储降息在即,市场加大押注随着交易员为美联储本周降息做准备,欧元/美元正逼近四年高点。此次降息将进一步拉大美联储与欧洲央行的政策分歧。
作者  Tony Chou
8 小时前
随着交易员为美联储本周降息做准备,欧元/美元正逼近四年高点。此次降息将进一步拉大美联储与欧洲央行的政策分歧。
placeholder
黄金再创新高,逼近3700!美元指数一看跌信号不容忽视!去美元化、实际利率下行,双重利好推动下黄金逼近3700;美中贸易迎进展,关注美联储点阵图公布;中期看跌信号:美元指数击穿97.30,下行空间或被进一步打开
作者  Insights
8 小时前
去美元化、实际利率下行,双重利好推动下黄金逼近3700;美中贸易迎进展,关注美联储点阵图公布;中期看跌信号:美元指数击穿97.30,下行空间或被进一步打开
placeholder
英国央行利率决议来袭!英镑汇率将迎巨震?11月能否降息成谜英国央行预计将减缓资产负债表缩减的速度,或对英镑汇率产生影响。
作者  Alison Ho
9 小时前
英国央行预计将减缓资产负债表缩减的速度,或对英镑汇率产生影响。
placeholder
美联储降息在即,黄金逼近3700美元再创新高!白银同步飙升黄金价格涨至3689美元/盎司,再创历史新高。白银价格涨至42.75美元/盎司,也创下14年来高点。
作者  Tony Chou
11 小时前
黄金价格涨至3689美元/盎司,再创历史新高。白银价格涨至42.75美元/盎司,也创下14年来高点。
goTop
quote