Ethereum developer exposes phishing scam using fake StreamYard domain

來源 Cryptopolitan

Ethereum core developer Zak Cole was recently targeted in a phishing scheme, where the attacker disguised a link as an invitation to appear on a podcast. According to Zak, the attempt relied on fake domains and a malicious installer to steal crypto credentials and data from his computer. 

Cole wrote a 21-post X thread late Monday, starting with how the scam began with a direct message on X inviting him to “Join our podcast!”

The sender, using the handle @0xMauriceWang on the social platform, posed as a representative of Blockwork’s Empire podcast and followed up with an email from what Zak said looked like “a legitimate podcast domain.”

Phisher tried to ‘help’ Zak install malicious app

According to the Ether core dev, the email included a link displayed as streamyard.com but was actually hyperlinked to streamyard.org. When Cole clicked, the page returned an “error joining” message and instructed him to download a desktop application to continue.

Scammer text to Zak Cole. Source: Zak.eth X account

In the screenshots Cole shared on his X thread, he declined making the installation at first because of his company’s security policies, but the attacker begged him to add it “just this once,” even sending a video tutorial to demonstrate how to install the supposed app. 

“Mate, it’s StreamYard, they have over 3 mil users. I have a corp laptop too, but it’s all good. The browser version barely works, maybe 1 out of 20 attempts actually connects. I’m pretty sure they keep it around as marketing, but in practice everyone ends up using the desktop app. Way more stable…” the message read.

That was when Cole saw “red flags everywhere,” and downloaded the package onto a controlled lab machine instead of his work computer. 

Inside the DMG file, he found a hidden Mach-O binary named “.Streamyard,” a Bash loader, and a fake Terminal icon meant to trick users into dragging it to gain system-level access.

He described the loader as a “Russian nesting doll of bullshit,” explaining how it concatenated base64 fragments, decrypted them with a key, re-encoded the result, and executed it. Each step was intended to evade antivirus detection.

“Decoded offline, Stage2 was AppleScript that would find the mounted volume, copy .Streamyard to /tmp/.Streamyard, strip quarantine with xattr -c, chmod +x, then execute. Silent, surgical, and deadly,” the dev explained, jotting down the line of code.

Cole added that if a victim disabled macOS Gatekeeper or fell for the phishing Terminal drag trick, the malware would have silently exfiltrated everything, including passwords, crypto wallets, emails, messages, and photos.

Conversation with the attacker reveals hired malware services

Instead of shutting the operation down, Cole joined a live call with the scammer after asking them to help, who appeared nervous and read from a script while trying to guide him through the fake installation. 

During the video call session, the Ether programmer began screen-sharing, scrolling through a folder of explicit Kim Jong Un videos to throw the attacker off balance.

As he pressed for answers on why it wasn’t working, the scammer admitted he was not part of a state-backed operation, but was in an active community of hackers that had rented a phishing kit for about $3,000 a month. 

Cole noted the attacker used colloquialisms such as “mate” to trick victims into thinking he was based in the United Kingdom or close to the United States. The attacker also revealed that he did not control the infrastructure directly and could not manage the payload domains, and he was using a “budget cybercrime as a service.”

According to crowdsourced security intelligence firm VirusTotal’s findings, the delivery infrastructure they used was lefenari.com, which hosted payloads through scripted endpoints, and streamyard.org, as a lure. Both domains are now disabled, with assistance from cybersecurity firm Security Alliance.

The smartest crypto minds already read our newsletter. Want in? Join them.

免責聲明:僅供參考。 過去的表現並不預示未來的結果。
placeholder
【今日市場前瞻】美國「恐怖數據」來襲!黃金衝向3700美元美國「恐怖數據」來襲!市場或迎波動;黃金衝向3700美元,再創歷史新高!歐元/美元大漲站上1.18>>
作者  Alison Ho
6 小時前
美國「恐怖數據」來襲!市場或迎波動;黃金衝向3700美元,再創歷史新高!歐元/美元大漲站上1.18>>
placeholder
市場正在對 Google AI重新定價:漲幅超車輝達,3萬億市值只是起點?科技巨頭「七巨頭」的競爭格局正悄悄生變。 今年迄今,Alphabet(Google母公司)以33%的漲幅,超越輝達32.3%的升幅,成為「七巨頭」中表現最好的股票。 這一表現標誌著市場對Google的信心顯著回歸——要知道,年初時該公司還因AI衝擊搜尋業務和反壟斷壓力,股價一度深跌24.6%。
作者  投資-槓把子
7 小時前
科技巨頭「七巨頭」的競爭格局正悄悄生變。 今年迄今,Alphabet(Google母公司)以33%的漲幅,超越輝達32.3%的升幅,成為「七巨頭」中表現最好的股票。 這一表現標誌著市場對Google的信心顯著回歸——要知道,年初時該公司還因AI衝擊搜尋業務和反壟斷壓力,股價一度深跌24.6%。
placeholder
群聯8月獲利暴增49倍 EPS衝3.15元!NAND漲價助攻 股價10日飆40%晶片大廠群聯(8299)於今(16)日發布亮眼財報,8月營收達59.34億元,較去年同期成長23.48%;稅後純益大幅躍升至6.5億元,相較去年同期驚人增長49倍,每股稅後純益(EPS)達3.15元,表現相當強勁。
作者  財富進化論
7 小時前
晶片大廠群聯(8299)於今(16)日發布亮眼財報,8月營收達59.34億元,較去年同期成長23.48%;稅後純益大幅躍升至6.5億元,相較去年同期驚人增長49倍,每股稅後純益(EPS)達3.15元,表現相當強勁。
placeholder
歐元兌美元匯率可望突破1.20?聯準會降息在即,市場加大押注隨著交易員為聯準會本週降息做準備,歐元兌美元正逼近四年高點。此次降息將進一步拉大聯準會與歐洲央行的政策分歧。
作者  Tony Chou
7 小時前
隨著交易員為聯準會本週降息做準備,歐元兌美元正逼近四年高點。此次降息將進一步拉大聯準會與歐洲央行的政策分歧。
placeholder
抽中現賺44.6萬!達明機器人申購開跑 9月還有這两个「隱藏版」抽籤機會!​投資慧眼Insights-達明機器人(4585)今(16)日起開放上市公開申購,若以盤中最高價684元計算,中籤潛在獲利高達44.6萬元!
作者  投資指南針
7 小時前
​投資慧眼Insights-達明機器人(4585)今(16)日起開放上市公開申購,若以盤中最高價684元計算,中籤潛在獲利高達44.6萬元!
goTop
quote