Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine

March 18, 2026

A Webinar Guide to Auditing Modern Agentic Workflows

March 18, 2026

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

March 18, 2026
Facebook X (Twitter) Instagram
Thursday, March 19
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Crypto Scam “ShieldGuard” Dismantled After Malware Discovery
News

Crypto Scam “ShieldGuard” Dismantled After Malware Discovery

Team-CWDBy Team-CWDMarch 18, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A cryptocurrency scam known as “ShieldGuard” has been dismantled after researchers identified it as a malicious browser extension designed to harvest sensitive user data.

The operation, uncovered by Okta Threat Intelligence and described in an advisory published on March 17, initially presented itself as a security tool aimed at protecting crypto wallets from phishing and harmful smart contracts.

ShieldGuard combined social media promotion, a browser extension listing and a token “airdrop” incentive model to attract users. Participants were encouraged to download the extension and promote it in exchange for future cryptocurrency rewards.

The project claimed its software could detect suspicious transactions before users approved them. However, analysis revealed a very different purpose.

Malware Capabilities Revealed

Okta found the extension was built to extract valuable information from users interacting with major crypto platforms, including Binance, Coinbase and MetaMask. It also targeted general browsing activity and Google services.

Key capabilities included:

  • Harvesting wallet addresses across all visited websites

  • Capturing full HTML content from crypto platforms after login

  • Tracking users persistently across sessions

  • Executing remote code via a command-and-control (C2) server

The malware also used obfuscation and a custom JavaScript interpreter to bypass Chrome security restrictions. This allowed attackers to deliver and execute code dynamically without triggering standard protections.

Read more on cryptocurrency scams: Crypto Hack Losses in First Half of 2025 Exceed 2024 Total

Further investigation showed the infrastructure enabled attackers to collect account balances, transaction histories and portfolio data. In some cases, users could be redirected to fake warning pages controlled by the attackers.

Links to Wider Campaign and Takedown

Evidence suggested the operators may be Russian-speaking, based on language indicators in the code. Researchers also identified links to another campaign known as “Radex,” indicating a broader threat network.

Okta worked with industry partners to disrupt the operation by:

  • Removing the extension from the Chrome Web Store

  • Taking down associated domains

  • Disabling backend infrastructure

  • Blocking user sign-in functionality

These actions effectively severed communication between infected browsers and the attackers’ servers. Users are advised to limit plugin use, verify sources and treat offers of free tokens with caution.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
Next Article FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Team-CWD
  • Website

Related Posts

News

AI-Enabled Adversaries Compress Time-to-Exploit – Infosecurity Magazine

March 18, 2026
News

A Webinar Guide to Auditing Modern Agentic Workflows

March 18, 2026
News

New Ubuntu Flaw Enables Local Attackers to Gain Root Access

March 18, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.