🎉 Congratulations to the following users for winning in the #Gate CBO Kevin Lee# - 6/26 event!
KaRaDeNiZ, Sakura_3434, Anza01, asiftahsin, GateUser-d0654db3, milaluxury, Ryakpanda, 静.和, milaluxury, 币大亨1
💰 Each winner will receive $5 Points!
🎁 Rewards will be distributed within 14 working days. Please make sure to complete identity verification to be eligible.
📌 Event details: https://www.gate.com/post/status/11782130
🙏 Thank you all for your enthusiastic participation — more exciting events are on the way!
BOM malicious applications steal users' Wallets, over 13,000 people affected with losses of 1.82 million dollars.
Malware Bom Attack Incident Analysis
On February 14, 2025, multiple users reported that their wallet assets were stolen. After investigation, it was found that the stolen cases all exhibited characteristics of mnemonic phrase or private key leakage. Further discovery revealed that most of the affected users had installed and used an application called BOM. In-depth analysis indicated that this application was actually a carefully disguised scam software. Malicious actors used this software to induce users to authorize, illegally obtaining mnemonic phrase/private key permissions, and subsequently implementing systematic asset transfer and concealment.
Malware Analysis
A security team collected and analyzed the BOM application apk files on some users' mobile phones, drawing the following conclusions:
This malicious application deceives users into authorizing local file and photo album permissions under the pretext of needing to run after entering the contract page.
After obtaining authorization, the application scans and collects media files from the device's photo album in the background, packaging and uploading them to the server. If user files or the album contain mnemonic phrases or private key-related information, malicious actors may exploit the collected information to steal users' wallet assets.
The analysis process revealed the following suspicious points:
On-chain Capital Analysis
According to on-chain tracking analysis, the main stealing address has stolen funds from at least 13,000 users, profiting over 1.82 million dollars.
The first transaction for this address appeared on February 12, 2025, with initial funding traceable to an address marked as "stolen private key".
Capital flow analysis:
Another hacker address profited approximately $650,000, involving multiple chains, with the related USDT all cross-chain to TRON addresses. Some of the funds were transferred to addresses that had previously interacted with a certain payment platform.
![OKX & SlowMist Joint Release|Bom malware sweeps tens of thousands of users, stealing assets over 1.82 million dollars](