


As a result of the botnet's latest features, Check Point believes it may become even more stable and more dangerous. Once deployed, Twizt essentially acts on its own without any active command and control servers, which means the botnet can automatically widen its net by skirting past traditional security defenses. In its most profitable attack, the botnet snagged 26 in Ethereum ($105,000). Known as Twizt, the variant has already stolen almost half a million dollars in cryptocurrency over a year, mostly from people in Ethiopia, Nigeria and India.įrom November 2020 to November 2021, Phorpiex bots hijacked 969 cryptocurrency transactions, grabbing 3.64 Bitcoin ($179,000), 55.87 in Ethereum ($227,000), and $55,000 in ERC20 tokens. In a blog post published Thursday, Check Point said that it found a new variant of the Phorpiex botnet, famous for sextortion and crypto-jacking attacks. More about cybersecurity10 ways ransomware attackers pressure you to pay the ransomCybersecurity, the pandemic and the 2021 holiday shopping season: A perfect stormWhy Windows 11's security is such a big dealEnd user data backup policy (TechRepublic Premium) SEE: Identity theft protection policy (TechRepublic Premium) A new botnet variant discovered by cyber threat intelligence provider Check Point Research employs a unique method to steal cryptocurrency from its victims. And as botnets get more sophisticated, the level of damage they can inflict grows. The botnet uses a tactic called crypto clipping, which relies on malware to steal cryptocurrency during a transaction, says Check Point Research.īotnets are a popular tool used by cybercriminals to control a network of compromised machines for malicious purposes.
