BTCC / BTCC Square / Cryptopolitan /
Researchers Uncover Sophisticated Phishing Campaign Targeting Cardano Users in 2026

Researchers Uncover Sophisticated Phishing Campaign Targeting Cardano Users in 2026

Published:
2026-01-03 13:55:06
7
3

Researchers expose phishing campaign targeting Cardano users

Security sleuths just pulled back the curtain on a coordinated phishing operation—and Cardano holders are squarely in the crosshairs.

The Anatomy of the Attack

Forget clumsy email scams. This campaign leverages fake staking pools and spoofed community platforms to siphon credentials. Attackers mimic legitimate Cardano ecosystem sites with chilling accuracy, dangling promises of boosted yields or exclusive NFT drops. Once users bite, wallet details get harvested faster than you can say 'private key.'

Why Cardano? Why Now?

The timing's no accident. As ADA adoption climbs, so does the target on its back. Sophisticated actors chase volume—where the money flows, the phishers follow. It's a grim reminder: in crypto, your returns are only as secure as your operational security.

The Silver Lining Playbook

Researchers mapped the entire kill chain. They've shared IOCs and wallet addresses, enabling exchanges and wallet providers to blacklist malicious domains. The community's already circulating warnings—decentralized defense in real time.

Stay Sharp, Stay Sovereign

This isn't a Cardano flaw—it's an industry-wide reality. Every major chain faces these threats. The lesson? Double-check URLs, use hardware wallets, and remember: if an offer seems too good to be true, it's probably a scam. Even in decentralized finance, there's no free lunch—just different people picking your pocket.

Hackers are targeting Cardano wallet users

According to reports, the hackers were able to create a replica of the official Eternl Desktop announcement, complementing it with a message about hardware wallet compatibility, local key management, and advanced delegation control.

The email shows a polished, professional tone with proper grammar and no visible spelling errors, making it very effective at deceiving cardano community members. Meanwhile, it distributes malware to any system it enters.

Reports mentioned that the campaign uses a newly registered domain, download(dot)eternldesktop(dot)network, to distribute a malicious installer package without the need for an official verification or digital signature validation.

In the detailed technical analysis carried out by Anurag, an independent threat hunter and malware analyst, the legitimate Eternl.msi file contains a hidden LogMeIn Resolve remote management tool bundled within its installation package.

The discovery exposed a supply chain abuse attempt aimed at establishing persistent unauthorized access on victim systems. The malicious MSI installer, with a size of 23.3 megabytes and with hash 8fa4844e40669c1cb417d7cf923bf3e0, drops an executable called unattended updater.exe, which uses the original filename GoToResolveUnattendedUpdater.exe.

During runtime analysis, the executable creates an identified folder structure under the system’s Program Files.

Once it creates the Program Files, it creates a directory and writes multiple configurations, including unattended.json, logger.json, mandatory.json, and pc.json. The unattended.json configuration file enables remote access functionality without needing the user to interact.

The dropped executable attempts to establish connections to infrastructure associated with legitimate GoTo Resolve Services, including devices-iot.console.gotoresolve.com and dumpster.console.gotoresolve.com.

Malware provides hackers with remote access

According to network analysis, the malware sends information to the hackers in JSON format. It also uses remote servers to establish a communication channel for command execution and system monitoring.

Security researchers say this behavior is important because remote management tools allow hackers to carry out remote command execution and steal credentials once the malware is installed on a victim’s system.

The Cardano phishing campaign also shows how hackers use crypto and the branding of legitimate platforms to distribute tools that have been infected with malware. This means that users need to verify the authenticity of the software they use through official channels. In addition, they must also avoid downloading wallet applications from unverified sources or newly registered domains, irrespective of how good their distribution emails appear.

This Cardano phishing campaign is similar to the one that targeted customers using Meta for advertisements last year. Users are lured with emails that claim their ads have been temporarily suspended due to violations of advertising policies and EU regulations.

The scammers even go as far as making it appear legitimate by adding the official Instagram branding and official-sounding language about policy violations. However, closer inspection showed that the emails were from a different domain.

Researchers mentioned that upon clicking the link, users are redirected to a fake Meta Business page that looks convincing. The website mimics the real support site, opening up with a page that warns the user that their account faces termination if they do not take action immediately.

Users are tricked into inputting their Ad login into the spaces provided, with the customer support guiding them with a provided step-by-step instruction to restore their accounts.

Join Bybit now and claim a $50 bonus in minutes

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.