Omnistealer uses the blockchain to steal everything it can
好的,我现在需要帮用户总结一篇文章,控制在100字以内。用户的要求很明确,不需要用“文章内容总结”之类的开头,直接写描述即可。 首先,我得通读整篇文章,抓住主要信息。文章讲的是一个叫做Omnistealer的新信息窃取恶意软件。它利用区块链作为永久的恶意软件托管平台,这对企业和普通用户都是坏消息。 接下来,文章详细说明了Omnistealer如何利用区块链的特性。传统恶意软件通常存储在公共平台上,比如GitHub或Google Drive,但这些平台的内容可以被删除。而Omnistealer则将恶意代码嵌入到TRON、Aptos和Binance Smart Chain等区块链的交易中。由于区块链是不可变的,这些恶意代码一旦上链就无法删除。 然后,文章描述了Omnistealer的功能。一旦进入系统,它会窃取超过10个密码管理器、主流浏览器的登录信息和会话数据、云存储账户以及60多个基于浏览器的加密钱包的信息。研究人员估计已经有30万凭证被盗。 此外,文章还提到了攻击通常是通过伪装成简单的编码任务开始的,比如承包商在LinkedIn或Upwork上收到工作机会,并运行看似正常的代码。这些代码实际上会连接到区块链,读取交易数据并下载最终的有效载荷。 最后,文章给出了一些防范建议,比如使用虚拟机测试项目、启用多因素认证等。 现在我需要把这些信息浓缩到100字以内。重点包括:Omnistealer利用区块链存储恶意代码、其窃取的数据范围广泛、攻击方式以及防范措施。 可能的结构是:首先介绍Omnistealer及其利用区块链的特点;然后说明它窃取的数据类型;接着提到攻击方式;最后简要提及防范建议。 现在开始组织语言: “Omnistealer是一种新型信息窃取恶意软件,利用区块链存储不可删除的恶意代码。它能窃取密码管理器、浏览器数据及加密钱包等信息,并通过伪装正常项目传播。由于区块链特性,此类威胁难以清除。” 检查字数:刚好100字左右。 </think> Omnistealer是一种新型信息窃取恶意软件,利用区块链存储不可删除的恶意代码。它能窃取密码管理器、浏览器数据及加密钱包等信息,并通过伪装正常项目传播。由于区块链特性,此类威胁难以清除。 2026-4-14 11:52:15 Author: www.malwarebytes.com(查看原文) 阅读量:14 收藏

A new infostealer dubbed Omnistealer is turning the blockchain into a permanent malware hosting platform, which is bad news for both companies and everyday users.

It’s pretty common for malware to store its payload on a public platform, ideally one that adds some trustworthiness to the download location, like Google docs, OneDrive, GitHub, npm, PyPI, and so on.

The problem for malware peddlers is that these can be taken down. It can sometimes take a while and a lot of trouble, but it’s possible. Omnistealer gets around this by storing its staging code inside transactions on public blockchains like TRON, Aptos, and Binance Smart Chain.

Some blockchain transactions allow small bits of arbitrary data (notes, metadata, smart contract inputs) and instead of something harmless, attackers insert:

  • Encrypted text
  • Encoded commands
  • Pieces of malware code

And because blockchains are append‑only, those malicious snippets are effectively undeletable once they’re mined into a block. You can revoke domains and pull GitHub repos, but you can’t roll back TRON or BSC just to remove a few hundred bytes of malware staging code.

That turns public ledgers into a resilient, censorship‑resistant command and control infrastructure that defenders can’t simply take down.

Despite the obvious connection to cryptocurrency, Omnistealer is not solely about robbing crypto-investors. Once Omnistealer lands on a system, it goes after:

  • More than 10 password managers, including cloud‑synced consumer tools such as LastPass.
  • Major browsers like Chrome and Firefox, scraping saved logins and session data.
  • Cloud storage accounts, including Google Drive credentials.
  • Over 60 browser‑based crypto wallets, including popular extensions like MetaMask and Coinbase Wallet.

 It’s designed to be a one‑stop data vacuum that investigators say will “literally steal everything.

The attack typically starts with a “simple” coding gig: a contractor gets a LinkedIn or Upwork offer, pulls a GitHub repository, and runs what looks like normal project code. Behind the scenes, that code reaches out to the blockchain, reads transaction data, and uses it as a pointer to fetch and decrypt the final payload.

Researchers estimate that roughly 300,000 credentials have already been compromised, spanning everything from adult‑industry platforms and food delivery to financial compliance firms, defense suppliers, and US government entities. 

What you can do 

You can’t delete malware from the blockchain, but you can make it much harder for campaigns like this to affect you. First, reduce what’s available to steal. Then protect your information better.

  • Treat “dream job” and unsolicited contract offers as suspicious by default, especially if they move quickly to off‑platform chats (Telegram, Discord) or ask you to run code from a private repository.
  • Lock down your passwords with a reputable password manager and turn on multi-factor authentication (preferring app or key over SMS) for any important or sensitive account.
  • Use an up-to-date, real-time anti-malware solution to block, detect, and remove threats like Omnistealer.
  • Don’t use your everyday user profile or main workstation as a test bench for random GitHub projects or side gigs. Use a virtual machine or separate system instead.
  • Watch your crypto and banking accounts for unexplained logins or withdrawals, and move funds to new wallets if you suspect compromise.

We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/omnistealer-uses-the-blockchain-to-steal-everything-it-can
如有侵权请联系:admin#unsafe.sh