Photo by Morrowind/Shutterstock.com
A sophisticated email phishing campaign targets cryptocurrency enthusiasts by masquerading as an official Binance communication, luring victims with the promise of free Trump coins. However, instead of accessing these digital assets, victims unwittingly install a remote access trojan (RAT) known as ConnectWise, enabling cybercriminals to seize control of their devices in under two minutes.
According to researchers, phishing emails are crafted to closely resemble official Binance correspondence using ‘Binance’ as the sender’s name and incorporating elements that instil a false sense of legitimacy. Notably, the emails include a ‘risk warning,’ a common feature in genuine Binance communications, which increases the likelihood of users trusting the message.

Upon clicking the provided link, victims are redirected to a website mimicking Binance’s interface. The fraudulent website does not directly replicate Binance’s Trump coin page or client download section but blends images from both to create a deceptive interface.
Below the primary content, additional installation steps are included, further reinforcing the illusion of legitimacy.
Victims who attempt to download the purported Binance desktop client receive an installer for ConnectWise RAT. Once executed, the malware establishes a connection to a command-and-control (C2) server that the attackers actively monitor.

Unlike typical ConnectWise RAT infections, where attackers may delay engagement with compromised machines, the perpetrators behind this campaign act swiftly — gaining remote access to victims’ systems in les than two minutes.
After gaining access, the attackers primarily focus on extracting stored credentials from web browsers like Microsoft Edge. ConnectWise RAT, while not traditionally an information-stealing tool, enables cybercriminals to obtain saved passwords and other sensitive data, effectively bypassing the RAT’s usual limitations.
Researchers advise users to exercise extreme caution when receiving emails purportedly from cryptocurrency exchanges. Key protective measures include verifying sender details, examining URLs, using multi-factor authentication (MFA), and updating the security software.
In the News: JioHotstar, LV, Warner Bros, and others fight copycat websites surge