Beware of Malware: Hackers Target Cryptocurrency Users with Browser Extensions

TL;DR Summary
A new malicious browser extension called Rilide has been discovered, which targets Chromium-based products like Google Chrome, Brave, Opera, and Microsoft Edge. The malware is designed to monitor browser activity, take screenshots, and steal cryptocurrency through scripts injected in web pages. Rilide also has a 2FA-bypassing system that uses forged dialogs to deceive victims into entering their temporary codes. While the roll-out of Manifest v3 on all Chromium-based browsers will improve resistance against malicious extensions, it won’t eliminate the problem.
- Hackers use Rilide browser extension to bypass 2FA, steal crypto BleepingComputer
- Rilide malware is stealing 2FA codes and passwords — what you need to know Tom's Guide
- This dangerous malware disguises itself as a legit browser extension to steal your cash TechRadar
- CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users The Hacker News
- Cryptocurrency-stealing malware targets Chrome, Edge, Opera browsers MyBroadband
- View Full Coverage on Google News
Reading Insights
Total Reads
0
Unique Readers
0
Time Saved
2 min
vs 3 min read
Condensed
83%
482 → 80 words
Want the full story? Read the original article
Read on BleepingComputer