📢 Gate Square #Creator Campaign Phase 1# is now live – support the launch of the PUMP token sale!
The viral Solana-based project Pump.Fun ($PUMP) is now live on Gate for public sale!
Join the Gate Square Creator Campaign, unleash your content power, and earn rewards!
📅 Campaign Period: July 11, 18:00 – July 15, 22:00 (UTC+8)
🎁 Total Prize Pool: $500 token rewards
✅ Event 1: Create & Post – Win Content Rewards
📅 Timeframe: July 12, 22:00 – July 15, 22:00 (UTC+8)
📌 How to Join:
Post original content about the PUMP project on Gate Square:
Minimum 100 words
Include hashtags: #Creator Campaign
Fake Crypto Startups Use Social Media To Spread Wallet-Stealing Malware
HomeNews* Cybercriminals are targeting cryptocurrency users with fake startup companies to distribute Malware.
The attackers frequently use verified and compromised X accounts linked to actual companies or employees, making their fake brands appear more credible to potential victims. Gould noted, “They make use of sites that are used frequently with software companies such as X, Medium, GitHub, and Notion. Each company has a professional looking website that includes employees, product blogs, whitepapers and roadmaps.”
Some of the fictitious companies involved include Eternal Decay, BeeSync, Buzzu, Cloudsign, Dexis, KlastAI, Lunelior, NexLoop, NexoraCore, NexVoo, Pollens AI, Slax, Solune, Swox, Wasper, and YondaAI. Attackers approach targets via direct messages, offering payment in cryptocurrency to test out products. If victims comply, they are sent to crafted websites to download harmful applications.
On Windows, the fake app profiles the user’s machine and runs an installer believed to act as an information thief. On macOS, the malware known as Atomic macOS Stealer (AMOS) collects documents, browser data, and crypto wallet information. The installer also sets up persistence, meaning the malicious application restarts each time the computer is rebooted.
According to Darktrace, the tactic is similar to previous scams identified under the name “Meeten” and is linked to threat groups like “Crazy Evil,” who use similar malware. The campaign demonstrates a continued evolution in the complexity of tactics used to target and defraud cryptocurrency investors.
For more details on the campaign and its methods, visit the full Darktrace report. A technical overview on persistence can be found through Apple’s Launch Agent documentation.