Beware of “Cracked” TradingView- It is Trojan Trojan Check
Malwarebytes warned of a new form of harmful programs to steal hidden encryption within the “Classic” version of TradingView Premium, programs that provide drawing tools for financial markets.
The fraudsters lie on behalf of Crypto Subreddits, and they publish links to Windows and Mac warehouses for “TradingView Premium Cracked”, which are returned with harmful programs aimed at stealing personal data and encryption portfolios in Jerome Sigura, a major security researcher at Malwarebytes, He said In the March 18 blog.
He added: “We have heard about the victims whose encrypted governor was emptied and the personality of the criminals who sent hunting links to their contacts was impersonated.”
The fraudsters claim that the programs are free and they were cracked directly from their official version, but they are already full of harmful programs. source: Malwarebytes
As part of SNARE, fraudsters claim that the programs are free and they were cracked directly from their official version, and opened distinct features. It actually contains two software, Lumma Stealer and ATOMIC STALER.
Lumma Stealer is the stealing of information that has existed since 2022 and Primarily The coded currency and browser accessories target the 2FA (2FA). The atomic thief was first find out In April 2023, it is famous for its ability to capture data such as official passwords and the key series.
Besides “TradingView Premium Cracked”, fraudsters have provided other fraudulent programs to target encryption traders on Reddit.
Segura said that one of the interesting aspects of the scheme is that the deception also takes time to help users download the program with malware and help solve any download problems.
Sigura said: “The interesting thing in this particular plan is the extent to which the original poster is involved, as it passes the thread and being” useful “for users to ask questions or report a problem,” Sigura said.
“Although the original post gives heads that install these files on your own responsibility, and below in the interconnection index, we can read the comments from the original poster.”
In this case, the deception sticks to help users download the program that suffers from harmful programs. source: Malwarebytes
The origin of harmful programs was not clear, but Malwarebytes found that the website that hosts the files belongs to a Dubai cleaning company, and a driving server was registered and monitored by harmful programs by someone in Russia almost a week ago.
Segura says that the rising programs were vulnerable to decades -harmful programs, but “the temptation of a free lunch is still very attractive.”
The common red flags that must be paid attention to these types of fraud are instructions to disable safety programs so that the program can operate and password -protected files, according to Malwarebytes.
Related to: Microsoft warns of the new Access Access Trojan targeting the encryption portfolios
In this case, Segura says, “The files are compressed, where the final password is protected. For comparison, you will not need to be legitimately implemented in this way,” says Segura.
CHAINTICS at Blockchain Analytics reported in the Crypto Crime report for 2025 that Crypto CRIME has entered a professional era dominated by fraud that is driven by artificial intelligence, stablecoin washing, and effective electronic nucleus. Last year, the Analysis Company estimates that there were $ 51 billion in the volume of illegal transactions.
magazine: Fatee “Chinese mint” encryption fraud, Japan diving in Stablecoins: Asia Express