Shitcoin Wallet Pushing Malicious Codes, Collecting Exchange Credentials


Shitcoin Wallet, a web-based Ethereum wallet, is injecting malicious javascript codes to wallet users, stealing crucial information.

Revealed by Harry Denley, a security and anti-phishing expert, on Monday, the vulnerable codes are collecting credentials of major crypto platforms, including Binance, MyCryptoWallet, and many others.

Discover iFX EXPO Asia 2020 in Macao – The Largest Financial B2B Expo

Shitcoin Wallet works as a Chrome extension that downloads javascript files from a remote server. The code then looks for any open tabs on the web browser containing pages of any digital asset exchanges and Ethereum network tools to scrape the data in those windows.

The malicious codes send all the data to a remote server identified as “” The top-level domain belongs to a group of the south pacific island territory of New Zealand called Tokelau.

A suspiciously named wallet indeed

Designed to hold Ethereum and other ERC-20 tokens, the company claims that it has over 2,000 users. The platform basically operates as browser extensions, even though per the company, there is a desktop application for Windows.

“It is a web wallet which has several extensions for different browsers,” a blog post by the company explained.

Meanwhile, many browser extensions were found in the past with malicious codes. However, most of those were illegally mining digital currencies on victims’ computers.

Most recently, Google banned widely used Ethereum wallet and DApp browser MetaMask for violating its financial policy from Play Store. Though not specified, the tech giant indicated the crypto mining feature, which is strictly bans in its policy. Notably, the platform does not offer any crypto mining services to its users.

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like