
Video-sharing platform purportedly ran a malicious advertisement for () by mistake, according to a post on March 26.
Viewers interested in the advertisement were redirected to a malicious link using a common scamming method called or URL hijacking. In the Reddit post, a user named mrsxeplatypus warned the public about the promotion of a version of Electrum, and described how the scam ad worked:
“The malicious advertisement is disguised to look like a real Electrum advertisement […] It even tells you to go to the correct link (electrum.org) in the video but when you click on the advertisement it immediately starts downloading the malicious EXE file. As you can see in the image, the URL it sent me to is elecktrum.org, not electrum.org.”
Technology-focused site The Next Web that , which owns YouTube, has since taken appropriate actions against the advertisement.
In February, users of wallets Electrum and MyEtherWallet reported that they were phishing attacks. One user on Reddit found that a phishing scam attempting to steal sensitive data from Electrum was posing as a security update.
Redditor exa61 then posted a picture of a system message, allegedly from Electrum , requiring a security update to Electrum 4.0.0, while the latest version of the was Electrum 3.3.3 at the time.
Earlier in March, a Google Chrome browser extension dubbed NoCoin into participating in a fake airdrop from , claiming over 230 victims. Hackers had purposely disguised the malicious extension to look like a tool protecting users from malware or so-called cryptojacking.
Published at Tue, 26 Mar 2019 20:11:40 +0000