Close Menu
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
What's Hot

Ready for Anything: Local Electronics Manufacturer Turns Preparation Into a Competitive Edge

April 30, 2026

Globe AT HOME Crowned Most Recommended Internet Brand at 2026 Synergy YouGov Awards

April 30, 2026

“Minsan Gig sa Skydome” returns with two distinct nights of Sound and Community on May 8–9

April 30, 2026
Facebook X (Twitter) Instagram
Manila Republic
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
Manila Republic
Home»Tech»Kaspersky discovers ‘Tusk,’ active information and crypto stealing campaign
Tech

Kaspersky discovers ‘Tusk,’ active information and crypto stealing campaign

Team Manila RepublicBy Team Manila RepublicAugust 22, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Kaspersky has detected an online fraud campaign aimed at stealing cryptocurrency and sensitive information by exploiting popular topics such as web3, crypto, AI, online gaming, and beyond. Targeting individuals worldwide, the campaign is believed to be orchestrated by Russian-speaking cybercriminals and spreads info-stealing and clipper malware.

Kaspersky Global Emergency Response Team (GERT) has detected a fraud campaign targeting Windows and macOS users worldwide, aimed at stealing cryptocurrency and personal information. The attackers exploit popular topics to lure victims with fake websites that closely mimic the design and interface of various legitimate services. In recent cases, these sites have imitated a crypto platform, an online role-playing game, and an AI translator.  Although there are minor differences in elements of the malicious sites, like the name and URL, they appear polished and sophisticated, increasing the likelihood of a successful attack. 

Fake websites created as a part of Tusk campaign, mimicking legitimate crypto and AI services, and an online game

Victims are lured into interacting with these fake setups through phishing. The websites are designed to trick individuals into giving away sensitive information, such as crypto-wallet private keys, or downloading malware. The attackers can then either connect to the victims’ cryptocurrency wallets through the fake site and drain their funds, or steal various credentials, wallet details, and other information using the info-stealing malware. 

“The correlation between different parts of this campaign and their shared infrastructure suggests a well-organized operation, possibly linked to a single actor or group with specific financial motives,” says Ayman Shaaban, Head of Incident Response Unit, Global Emergency Response Team, Kaspersky. “In addition to the three sub-campaigns targeting crypto, AI, and gaming topics, our Threat Intelligence Portal has helped to identify infrastructure for 16 other topics — either older, retired sub-campaigns or new ones not yet launched. This demonstrates the threat actor’s ability to swiftly adapt to trending topics and deploy new malicious operations in response. It underscores the critical need for robust security solutions and enhanced cyber literacy to protect against evolving threats.”

Kaspersky discovered strings in the malicious code sent to the attackers’ servers in Russian. The word “Mammoth” (rus. “Мамонт”), slang used by Russian-speaking threat actors to refer to a “victim”, appeared in both the server communications and malware download files. Kaspersky dubbed the campaign “Tusk” to emphasize its focus on financial gain, drawing an analogy to mammoths hunted for their valuable tusks.

The campaign is spreading info-stealer malware such as Danabot and Stealc, as well as clippers such as an open-source variant written in Go (the malware varies depending on the topic within the campaign). Infostealers are designed to steal sensitive information like credentials, while clippers monitor clipboard data. If a cryptocurrency wallet address is copied to the clipboard, the clipper substitutes it with a malicious address.

Malware loader files are hosted on Dropbox. Once victims download them, they encounter user-friendly interfaces that serve as covers for the malware, prompting them to either log in, register or simply remain on a static page. In the meantime, the remaining malicious files and payloads are automatically downloaded and installed onto their system.

User interface of the malware downloader within the campaign targeting gamers
User interface of the malware downloader within the campaign targeting users of AI-translators

The detailed technical breakdown of the campaign is on Securelist. For a deeper immersion in the ever-evolving world of cyber threats and insightful networking, join Kaspersky’s Security Analyst Summit (SAS), which will take place for the sixteenth time from October 22-25, 2024, in Bali. 

To mitigate against Tusk-related cyberthreats, Kaspersky suggests the following measures: 

  • Check if the credentials for your company’s devices or web applications have been compromised by infostealers via dedicated Kaspersky Digital Footprint Intelligence landing page.
  • To guard against data-stealing malware and crypto-threats, individuals are advised to use a comprehensive security solution for any device, such as Kaspersky Premium. This will help prevent infections and alert them to dangers, such as suspicious sites or phishing emails that can be an initial vector for infection. And all new malicious samples from the Tusk campaign can already be detected by Kaspersky products.
  • Invest in additional cybersecurity courses for your staff to keep them up to date with the latest knowledge. Kaspersky Expert training on Windows Incident Response allows even seasoned specialists to train in incident response to identify the most complex attacks and brings concentrated knowledge from the company’s Global Emergency Response Team (GERT) experts.
  • Since info-stealing malware usually targets passwords, use a Kaspersky Password Manager to make using secure passwords easier.
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Team Manila Republic

    Related Posts

    QEMU abused to evade detection and enable ransomware delivery

    April 29, 2026

    Ant International Launches Open-Sourced Agentic Mobile Protocol to Drive AI Commerce

    April 29, 2026

    Alibaba Maintains Leading Position by Revenue as Asia Pacific’s Largest Cloud Provider with Growing Market Share

    April 29, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    Ready for Anything: Local Electronics Manufacturer Turns Preparation Into a Competitive Edge

    April 30, 2026

    Globe AT HOME Crowned Most Recommended Internet Brand at 2026 Synergy YouGov Awards

    April 30, 2026

    “Minsan Gig sa Skydome” returns with two distinct nights of Sound and Community on May 8–9

    April 30, 2026

    Converge powers the Philippines’ hosting of the ASEAN meetings with gigabit connectivity 

    April 30, 2026

    LG HVAC Solutions Dealers Convention 2026 Strengthens Partnerships and Showcases The Future of HVAC

    April 30, 2026
    Advertisement
    Don't Miss

    Ready for Anything: Local Electronics Manufacturer Turns Preparation Into a Competitive Edge

    GabrielApril 30, 2026

    Learn how Asurion Philippines evolved into a global electronics powerhouse, backed by a preparation-driven culture and…

    Globe AT HOME Crowned Most Recommended Internet Brand at 2026 Synergy YouGov Awards

    April 30, 2026

    “Minsan Gig sa Skydome” returns with two distinct nights of Sound and Community on May 8–9

    April 30, 2026

    Converge powers the Philippines’ hosting of the ASEAN meetings with gigabit connectivity 

    April 30, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    © 2026 ThemeSphere. Designed by ThemeSphere.
    • Home
    • Lifestyle
    • Tech
    • Travel
    • Review
    • About
    • Contact

    Type above and press Enter to search. Press Esc to cancel.