Scammers Launch Mass-Mailing Campaigns with Efimer Trojan to Steal Cryptocurrency

In recent months, cybersecurity experts have observed a surge in mass-mailing campaigns designed to spread the Efimer Trojan—a sophisticated and increasingly dangerous type of malware engineered to steal cryptocurrency. This new wave of attacks highlights both the technical skill and global scope of scammers targeting digital assets, underscoring the urgent need for enhanced vigilance among individuals and organizations.

Attack Vectors: Clever Deception and Broad Reach

The Efimer Trojan’s distribution relies primarily on deceptive email phishing and exploitation of compromised web infrastructure. Attackers frequently impersonate lawyers from reputable firms, contacting website owners with claims of trademark infringement. The messages threaten legal action, but promise a resolution via attached documentation. This file, typically packaged as an archive, actually contains the Efimer Trojan. Once unzipped and executed, the victim’s system is compromised.

In addition to phishing, scammers brute-force weak passwords on poorly secured WordPress websites. After gaining access, they upload malicious files disguised as popular torrents or movie downloads, baiting users searching for free content. When these files are downloaded and executed, the malware is installed.

Fake torrents remain a common vector. Cybercriminals spread malicious executables masquerading as media players or required installers, ensuring Efimer’s distribution across a wide range of targets.

Malware Functionality: Targeting Crypto Wallets and Credentials

The Efimer Trojan specializes in stealing cryptocurrency through several well-crafted mechanisms:

  • Clipboard Hijacking (ClipBanker): Efimer monitors the system clipboard for copied cryptocurrency wallet addresses and mnemonic seed phrases. If a user attempts to make a transaction, the Trojan stealthily replaces the real address with one belonging to the attacker, diverting funds.
  • Seed Phrase Theft: Efimer scans for mnemonic seed phrases, sending them (and sometimes screenshots of the screen) to remote servers controlled by the attackers. This enables full access to the victim’s crypto assets.
  • Persistence Techniques: The Trojan seeks administrative privilege, adds itself to antivirus exclusion lists, establishes scheduled tasks for automatic execution, and installs a Tor proxy to encrypt communications with its command-and-control server.
  • Wider Crypto Targets: While initial variants focused on Bitcoin, Ethereum, and Monero, recent iterations have expanded to include Tron, Solana, and other emerging digital currencies.

Technical Sophistication and Propagation

To evade detection, the Efimer Trojan employs advanced obfuscation techniques. Attackers utilize visually modified Unicode characters in passwords for malicious archives, making them harder for security software to flag as dangerous. Further, Efimer is equipped with self-propagation tools: compromised machines scan for more vulnerable WordPress sites and harvest email addresses to facilitate future attacks.

The scope of this scam is global. According to recent data, over 5,000 victims spanning countries such as Brazil, India, Spain, Russia, Italy, and Germany have been affected between October 2024 and July 2025.

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply