Malware, Ransomware

Malicious version of Syscoin’s Windows installer found on Github

Malicious actors replaced the legitimate Windows installer for Syscoin's cryptocurrency earlier this month with a version containing malware, which was available on the company's Github page for several days.

The malicious Windows installer was detected on June 13 when Windows Defender SmartScreen detected the sysccoincore-3.04-win64-setup.exe by Unknown Publisher appearing, Syscoin said. Anyone who downloaded and executed the installer between June 9 10:14 pm UTC and June 13 10:23 pm UTC is at risk. A look at the malware indicated to Syscoin that it was either ransomware or a keylogger.

“Upon investigation, the Syscoin developers found that a malicious, unsigned copy of the Windows Syscoin 3.0.4.1 installer was made available via the Syscoin Github release page on June 9th, 2018 due to a compromised GitHub account. This installer contained malicious code. (Trojan:Win32/Feury.B!cl),” Syscoin said on Github.

Those who are uncertain whether or not they have a safe and verified version should go to Settings->Apps and make a note of the installation date and check it against the period when the malicious version was live on Github, Syscoin said.

Syscoin also noted it will institute several additional safety measures for its developers and Blockchain Foundery staff, including implementing two-factor authentication, Perform routine verification of signature hashes and to work with Github to ensure users will be able to detect if binaries have been altered after release.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

Adware

You can skip this ad in 5 seconds