Cardano Users Targeted by Phishing Fraud Distributing Wallet Malware

Cardano holders are facing an escalating security threat as cybercriminals launch a sophisticated phishing fraud campaign impersonating the Eternl Desktop wallet. The scheme combines professional-looking emails, fraudulent cryptocurrency incentives, and hidden malware to compromise user systems. Security researchers have uncovered that victims downloading the fake wallet receive a malicious installer containing remote access trojans, granting attackers complete system control without authorization.

How the Phishing Fraud Campaign Operates

The attack begins with convincing phishing emails that spoof official Eternl Desktop communications. Attackers claim to introduce new features such as improved Cardano staking support and governance integration. The fraudulent messages dangle attractive incentives including NIGHT and ATMA token rewards, creating urgency and encouraging users to download the “updated” wallet immediately.

The emails direct users to download(dot)eternldesktop(dot)network, a newly registered domain that mimics the legitimate Eternl website. According to threat researcher Anurag, the attackers meticulously copied language and design elements from authentic Eternl announcements, adding fictional features like local key management and hardware wallet compatibility. The phishing fraud demonstrates professional execution—emails contain no spelling errors and use formal terminology, making the scam appear credible to unsuspecting users.

Each message includes a download link to a trojanized MSI installer file. The file bypasses standard security verification mechanisms and lacks valid digital signatures that would indicate legitimacy. When users execute the installer, they unknowingly activate the malicious payload embedded within.

Malicious Installer Delivers Remote Access Trojan

The weaponized installer, named Eternl.msi (file hash: 8fa4844e40669c1cb417d7cf923bf3e0), bundles a dangerous LogMeIn Resolve tool. Upon execution, the installer deploys an executable file named unattended updater.exe, which is actually the GoToResolveUnattendedUpdater.exe component.

This executable establishes persistence on the victim’s machine by creating directories within Program Files and writing multiple configuration files, including unattended.json and pc.json. The unattended.json file is particularly dangerous—it silently activates remote access capabilities without user awareness or consent. Once activated, the infected system becomes fully controllable by attackers.

Network traffic analysis confirms the malware communicates with known GoToResolve command-and-control infrastructure, specifically devices-iot.console.gotoresolve.com and dumpster.console.gotoresolve.com. The malware transmits system information in JSON format and establishes persistent connections, allowing threat actors to issue commands remotely. Victims have no indication their system has been compromised until attackers exploit the access.

Comparing to Previous Meta Phishing Fraud Schemes

This Cardano wallet attack follows a similar playbook used in earlier phishing fraud targeting Meta business users. In that campaign, victims received emails claiming their advertising accounts had violated EU regulations. The messages employed Meta branding and official language to establish false credibility.

Clicking the link redirected users to a fabricated Meta Business Manager page displaying urgent warnings about account suspension. Users were prompted to enter login credentials to “restore” access. A fake support chat then guided victims through what appeared to be account recovery, but actually harvested their authentication information.

The parallel structure—urgency, impersonation, fake landing pages, and credential harvesting—reveals how attackers reuse effective social engineering tactics across different target audiences. Whether targeting cryptocurrency users or business managers, the phishing fraud methodology remains consistent: establish false legitimacy, create pressure, and exploit user trust.

Protecting Against Wallet Impersonation Attacks

Security experts and wallet developers urge users to adopt defensive practices against phishing fraud. Always download wallet software exclusively from official project websites or verified app stores. Newly registered domains pose extreme risk—verify domain age and SSL certificate details before trusting a website.

Be skeptical of unsolicited emails promoting wallet updates or offering unexpected token rewards. Legitimate wallet projects rarely distribute software through phishing campaigns, and authentic updates appear through established channels. Examine email sender addresses carefully, as spoofed addresses sometimes contain subtle character substitutions.

Enable two-factor authentication on cryptocurrency exchange accounts and important email accounts linked to wallets. This additional layer prevents unauthorized access even if credentials are compromised. Maintain updated antivirus and anti-malware software to detect known trojans like LogMeIn Resolve variants.

Finally, if you have downloaded any suspicious wallet applications, immediately disconnect affected computers from networks and run comprehensive malware scans. Report suspected phishing fraud emails to the legitimate project’s security team. By maintaining vigilance against phishing fraud techniques and verifying legitimacy at every step, Cardano users can significantly reduce their exposure to these evolving threats.

ADA-3,35%
NIGHT-0,7%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)