Breaking

Hackers create a fake Pokemon NFT gaming website to infect devices

Malicious entities have crafted a fake Pokemon NFT card game website distributing the NetSupport remote access tool and taking over victim devices.

The website is “pokenon-go.io” which was online when this article was composed claims it has a new NFT card game built for Pokemon franchise providing users with NFT investment profits.

Considering that both NFTs and Pokemon are popular, it was easy for the threat actors to maliciously draw audience for their website by spam and social media posts.

Those who click on the ‘Play on PC’ button will download this executable that looks very similar to the legitimate game installer, however, it actually installs NetSupport remote access tool on the  victim’s system.

Identifying the fake Pokemon NFT scam campaign

An analyst from ASEC   has reported that there is  a second site that has been used in this campaign at “beta-pokemoncards[.]io” but now  has been moved offline.

Fake pokemon NFT website

This campaign was first seen in Dec 2022, while previous samples were found in VirusTotal showed that the same operators had deployed a Visual Studio file instead of the Pokemon game.

Deploying the RAT on to victim devices

The RAT tool is deployed in a new folder in the %APPDATA% path, and kept hidden thus evading the detection from AV scans. The installer also creates an entry in the Startup folder to ensure the RAT will run on system boot. Since NetSupport RAT is a legitimate program, hackers use it to evade the security solutions.

With RAT installed, threat actors can easily remote into user devices and extort data from their device, deploy additional malware or even attempt to distribute the malware as a worm to other systems in the network.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago