Fake Windows ads stealing recovery phrases! Facebook pushes a "Free Upgrade to Win11" post, mimicking the official Microsoft website, making it hard to distinguish real from fake.

動區BlockTempo

Hackers are using Facebook to run ads that impersonate Windows 11 updates, employing professional Microsoft branding and visuals to trick users into clicking. This leads to the installation of a malicious program called “Lunar Application,” which is designed to steal cryptocurrency wallet seed phrases and login credentials.
(Background: Beware of unofficial Windows 10 downloads containing trojans that can evade antivirus detection, which have already stolen $19,000 worth of crypto assets)
(Additional info: Kaspersky has found malicious software in popular Android and iOS apps that steal wallet seed phrases)

Table of Contents

Toggle

  • Fake Ads, Real Traps: A One-Stop Scam Impersonating Microsoft Official Website
  • “Lunar Application” Malicious Framework: Targeting Crypto Wallets
  • Geofencing Technology: Precisely Avoiding Security Scans
  • How to Protect Yourself?

Security researchers recently reported a new wave of attacks targeting cryptocurrency users spreading on Facebook. Hackers purchase ad space and run highly realistic “Free Windows 11 Upgrade” ads, using professional Microsoft branding and visuals to lure users into clicking.

Fake Ads, Real Traps: A One-Stop Scam Impersonating Microsoft Official Website

These ads are reportedly of very high quality, not only using Microsoft’s official logo and brand colors but also mimicking Microsoft’s official tone in their wording, making it difficult for average users to distinguish authenticity at first glance.

When users click the ad, they are directed to a meticulously cloned Microsoft official website. The site’s interface, layout, and even URL are deliberately disguised to lower suspicion. The site then prompts users to download a so-called “Windows 11 update package,” which is actually a carrier for malicious software.

“Lunar Application” Malicious Framework: Targeting Crypto Wallets

Once the user runs the downloaded installer, their computer becomes infected with a malicious framework called “Lunar Application.” Its core functions are designed to target cryptocurrency assets:

  • Stealing Wallet Seed Phrases: Scanning stored seed phrase backups on the computer; once obtained, hackers can fully control the victim’s crypto wallets.
  • Stealing Login Credentials: Extracting stored exchange account passwords and wallet app login info from browsers.
  • Stealing Other Sensitive Data: Including cookies and autofill form data, which can be used for further account hijacking.

Geofencing Technology: Precisely Avoiding Security Scans

Notably, the hackers have also employed “geofencing” techniques in this attack, deliberately filtering out connection requests from data center IP addresses. This means that automated scanners and sandbox environments used by security companies will have difficulty accessing the malicious sites, significantly reducing the chances of early detection and flagging.

This approach demonstrates the hackers’ advanced technical capabilities, combining social engineering with evasion of security defenses.

How to Protect Yourself?

In the face of increasingly sophisticated attacks, cryptocurrency users should stay vigilant:

  • Always download updates only from the official Microsoft website (microsoft.com): Avoid downloading software from social media ads.
  • Keep seed phrases offline: Never store seed phrases digitally on your computer.
  • Use hardware wallets: Store large assets in cold wallets like Ledger or Trezor.
  • Regularly check browser extensions: Remove any unknown or suspicious add-ons.
View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Holdstation has confirmed a security incident. Users are advised to transfer their assets to a secure wallet.

Foresight News reports that the account abstraction wallet Holdstation has confirmed a recent security incident. The extent and scope of the impact are still being assessed, and the team is actively investigating. The official will notify affected users as soon as possible, and everyone is advised to stay calm and patiently wait for the latest updates and remedial steps. Meanwhile, Holdstation recommends users transfer their assets to a secure wallet to protect their funds.

GateNewsBot1h ago

Trump DeFi project was hacked, and short sellers targeted it! The stablecoin USD 1 briefly dropped to $0.9942.

The USD stablecoin USD1 of the cryptocurrency project World Liberty Financial supported by the Trump family was subjected to an organized attack on . The price once dropped to $0.9942. The attackers hacked into multiple founders' accounts and spread rumors, attempting to profit from it. However, officials emphasized that the stability mechanism and asset reserves of USD1 remain intact, and the coin price has stabilized back to the $1 level. This incident highlights the security and market trustworthiness of the currency.

区块客2h ago

US Seizes $61 Million USDT Linked to "Pig Butchering" Scam, On-Chain Tracking Identifies Cryptocurrency Fraud Network

On February 25, the U.S. federal prosecutors announced the successful seizure of over $61 million in USDT. This funds are believed to be related to large-scale cryptocurrency "pig butchering" investment scams. According to a statement released by the U.S. Attorney's Office for the Eastern District of North Carolina, law enforcement officials tracked blockchain fund flows to identify a series of suspected money laundering crypto wallets. These wallets hold assets derived from victims of crypto romance scams who were deceived. The investigation was led by Homeland Security Investigations. Agents traced the victims' transfer paths to identify wallet accounts still holding substantial balances and initiated seizure and forfeiture procedures in accordance with the law. U.S. Attorney Ellis Boyle stated that this seizure demonstrates law enforcement's increased efforts to crack down on the crypto scam money chain, especially targeting cross-border fund transfers and multi-layer address obfuscation used in money laundering.

GateNewsBot3h ago

South Korean man loses $810,000 and is accused of poisoning a business partner, scheduled for trial on March 10.

The Eastern District Prosecutors' Office of Seoul, South Korea, has charged a man in his 30s with allegedly spiking his business partner's drink with the insecticide Methomyl during a meeting at a coffee shop in November 2025. The case stems from a financial dispute over Bitcoin investments, with both parties suffering losses of over 1.17 billion KRW (approximately $816,000). The defendant is scheduled to appear in court at the Seoul Eastern District Court on March 10, 2026.

MarketWhisper3h ago

IoTeX Security Incident Update: Asset Security, 99.5% of Anomalous Minting Frozen, Global Tracking Initiated

The IoTeX network has completed a version upgrade, resumed operation, and committed to fully compensate users affected by the ioTube incident. 99.5% of abnormal minting has been intercepted, and hacker funds have also been locked. The team is working with exchanges to restore trading and strengthen security measures to prevent similar incidents from happening again.

GateNewsBot4h ago
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)