Cardano Users Under Attack: How Phishing and Malware Threaten Your Wallet

A sophisticated attack campaign is targeting Cardano cryptocurrency users through coordinated phishing and malware distribution. Cybercriminals are impersonating the legitimate Eternl Desktop wallet team, leveraging deceptive emails to lure victims into downloading a malicious installer that grants complete remote system access. This multi-layered threat combines social engineering with advanced endpoint compromise techniques.

Deceptive Campaign Impersonates Eternl Wallet Through Fraudulent Communications

Attackers have launched a coordinated phishing offensive by posing as members of the Eternl team through professionally crafted emails. These bogus messages promote a non-existent desktop wallet version while claiming to offer exclusive cryptocurrency rewards, specifically NIGHT and ATMA tokens. The fraudulent communications highlight false features such as local key management and hardware wallet compatibility—details copied from legitimate Eternl announcements.

The emails exhibit professional polish with grammatically correct text and no obvious spelling errors, creating an air of authenticity that increases the likelihood of user engagement. Recipients are directed to click on a link leading to a newly registered domain: download(dot)eternldesktop(dot)network. According to threat researcher Anurag, the attackers invested considerable effort in mimicking official communication styles and product positioning to bypass user skepticism.

The core deception strategy revolves around urgency and incentive. By dangling the promise of token rewards and framing the “new wallet version” as an exclusive opportunity, attackers exploit the natural curiosity of Cardano community members. Once users click through, they encounter prompts to download an MSI installer file—the entry point for the actual compromise.

The Malware Delivery Mechanism: Remote Access Trojan Hidden in Installer

The malicious installer, named Eternl.msi (file hash: 8fa4844e40669c1cb417d7cf923bf3e0), contains a bundled LogMeIn Resolve utility. Upon execution, the installer drops an executable file labeled “unattended updater.exe”—an obfuscated version of GoToResolveUnattendedUpdater.exe. This executable is the actual malware payload responsible for system compromise.

Once installed, the trojan creates a specific folder structure within Program Files and writes multiple configuration files, including unattended.json and pc.json. The unattended.json configuration activates remote access capabilities without any user awareness or consent. This enables attackers to establish a persistent connection to the victim’s system, granting them full control over files, processes, and network communications.

Network traffic analysis reveals that the compromised system attempts to establish connections to known GoTo Resolve command-and-control infrastructure, specifically devices-iot.console.gotoresolve.com and dumpster.console.gotoresolve.com. The malware transmits system enumeration data in JSON format, effectively creating a backdoor that allows threat actors to execute arbitrary commands and exfiltrate sensitive data.

Recognizing the Red Flags Before Installation

Users can identify and avoid this attack by examining several warning indicators. Legitimate wallet downloads should only occur from official project websites or trusted repositories—newly registered domains are immediate red flags. Eternl’s genuine distribution channels do not include unsolicited email campaigns offering token rewards.

Before installation, users should verify file signatures and hash values against official announcements. The presence of unsigned executables or mismatched cryptographic hashes indicates tampering. Additionally, legitimate wallet software should not require elevated privileges or create hidden system directories and configuration files during installation.

Security best practices for Cardano users include: verifying sender email addresses against official contact lists, inspecting URLs for subtle misspellings or suspicious domain registrations, avoiding downloads from email links, and maintaining updated antivirus software capable of detecting remote access trojans like LogMeIn-based payloads.

Learning From Similar Scams: The Meta Precedent

This attack pattern closely mirrors a previous phishing campaign that targeted Meta Business users. In that incident, victims received emails claiming their advertising accounts had been suspended due to EU regulation violations. The messages used authentic Meta branding and official language to establish credibility. Users who clicked through were directed to counterfeit Meta Business login pages, where they were prompted to enter credentials. A fake support chat then guided victims through a “recovery process” that harvested their authentication details.

The structural similarities between the Meta campaign and this Cardano attack demonstrate an evolving attacker playbook: impersonate a trusted brand, create artificial urgency, harvest credentials or deliver malware, and exploit user trust in official communications. Awareness of these tactics strengthens defensive posture across cryptocurrency and broader digital asset communities.

Security researchers urge all Cardano ecosystem participants to maintain vigilance, verify sources independently, and report suspicious communications to official security teams.

ADA1,6%
NIGHT4,09%
TOKEN-2,23%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin

Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)