Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the multisite-clone-duplicator domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
[www-stage.newsbtc.com/news/ai-and-tech/myetherwallet-user-activity-compromised-for-hola-vpn-users/amp/]
[wp-includes/functions.php:6114 trigger_error(), wp-includes/functions.php:6054 wp_trigger_error(), wp-includes/l10n.php:1370 _doing_it_wrong(), wp-includes/l10n.php:1408 _load_textdomain_just_in_time(), wp-includes/l10n.php:194 get_translations_for_domain(), wp-includes/l10n.php:306 translate(), wp-content/plugins/multisite-clone-duplicator/include/lang.php:6 __(), wp-content/plugins/multisite-clone-duplicator/multisite-clone-duplicator.php:32 require_once('wp-content/plugins/multisite-clone-duplicator/include/lang.php'), wp-settings.php:471 include_once('wp-content/plugins/multisite-clone-duplicator/multisite-clone-duplicator.php'), wp-config.php:53 require_once('wp-settings.php'), wp-load.php:50 require_once('wp-config.php'), wp-blog-header.php:13 require_once('wp-load.php'), index.php:17 require('wp-blog-header.php')]

MyEtherWallet User Activity Compromised for Hola VPN Users | NewsBTC

MyEtherWallet User Activity Compromised for Hola VPN Users

Hola VPN

A fake version of the Hola VPN was uploaded to the Google Play Store on July 9 which compromised MyEtherWallet (MEW) for those who downloaded it. MEW user activity and passwords were exposed to the hacker for users who downloaded the app within the five hours it was live as they were directed to a fake website.

Hola VPN Hacked Exposing User Activity

Hola VPN’s Google Chrome Store account was compromised, which allowed a hacker to upload a modified version of the Chrome extension. The fake extension was programmed to ‘phish’ information about MEW accounts by re-directing the MEW users to the hacker’s website.

Hola said, in a blog post: “Immediately upon learning about the incident, we set up a CyberSecurity response team to investigate the incident. We also took immediate emergency steps to immediately replace the extension, secure the developer’s account, and to monitor versions on a constant basis to ensure this does not recur.”

“We are now determining the scope of the compromise, and conducting an assessment on steps that can be taken to help prevent such an incident from occurring in the future. We will share the findings from this analysis with the ecosystem to help ensure a safer Internet environment.”

Users may have been affected if they had the extension installed while the fake extension was on the app store and logged into MEW without being in incognito mode. Hola advised users to change passwords and only log into wallets in incognito mode where “code injection is not possible.”

MyEtherWallet tweeted: “Urgent! If you have Hola chrome extension installed and used MEW within the last 24 hrs, please transfer your funds immediately to a brand new account! We received a report that suggests Hola chrome extension was hacked for approximately 5 hrs and the attack was logging your activity on MEW.”

MEW told TechCrunch that the attack appears to be from a Russian-based IP address. MEW said that they do not store users’ personal data, including passwords, which means that hackers did not get hold of such information unless they interacted with the fake Hola extension on July 9.

Fake MEW Apps Claim 8,000 ETH

There are a high number of fake MEW websites which have scammed users for amounts up to 515 ETH according to a database by CryptoPolice. In total, these websites have scammed over 8,000 ETH from unsuspecting users. CryptoPolice encouraged all users to “be extra cautious and always check the domain names.”

Users have also been warned of downloading fake apps that make themselves look like the official app. Malware Researcher Lukas Stefanko reported a fake MEW app on Google Play Store on July 9. He said that the app “leaks user database with private keys.” He also said, on Twitter, that there are 15 apps with more than 400,000 combined downloads which can download additional content and display and click on invisible ads.

Featured image from Shutterstock.
Exit mobile version