7 working ways to hack other people's crypto wallets!

Teacher

Professional
Messages
2,677
Reputation
9
Reaction score
629
Points
113
Salute, bandits!

Hackers are constantly coming up with new divorce schemes.

Phishing
The bottom line is that the thief registers a domain that is almost identical to the one in the bitcoin wallet.

We open it, and we are automatically redirected to a phishing site. The resource looks no different from the official one, only the domain changed the three letters " kch "to"rcn". Instead of "blockchain.com" - "blockrcnain.com":

82b3f4e54300aa1e674d0.jpg


If you enter your ID and password on such a site, the attacker can easily write off all funds.

In order not to fall for this method of divorce, it will be enough to store all the sites in bookmarks or in notes.)

Mobile apps
The bottom line is that an attacker creates an application and uploads it to the GOOGLE MARKET. The user finds it through a search, then enters all their data and sends it to the little thief. Here is an example of such applications:

2e70fbc0e1d8eed538f32.jpg


And here are the reviews for them.

In order not to fall for such tricks, you need to search not in the app search, but follow the links from the official site. In the same Blockchain, there are only 2 links, one to Google Play, the other to the App Store. I wouldn't risk installing the rest of the apps, even if they have a 5-star rating and all the reviews

positive ones. Now everything can be screwed up, so this is not an indicator.

Browser extensions
The bottom line is that the thief creates extensions with the same interface as in the Trezor, Metamask or Ledger cryptocurrency wallet. The main goal is to get a person to highlight their seed phrase. You can use this phrase to restore access to your wallet and withdraw the crypt. For example, if you go to the Chrome online store and enter "Metamask" in the search, we see 3 wallets, 1 real and 2 more from unknown authors, which I would not install.

Despite the fact that Google employees regularly remove fraudulent extensions, new ones still appear

QR code Theft
In crypto wallets, there is a QUAR code that looks like this.

769e0bc80b20183eece0d.jpg


If an attacker scans it, it will easily withdraw money from your wallet. In the vast expanses of the Internet, there are a lot of schemes for how to lure it out( turn on C) NEVER SHOW IT TO ANYONE!

Clipрer
Clipper is a program that replaces wallet addresses in the clipboard. For example, if you need to transfer money, you copy your wallet number, and

Clipper automatically replaces it with the fraudster's wallet.

Once a person wrote to me on a social network, pretended to be my referral and said that he had an error in the project, so I looked at the screen. But instead of a screen, he gave me a link to download an unknown program. As it turned out-it was just the same Clipper. It's a pity the correspondence wasn't saved, as I blocked it and deleted the program. For myself, I decided that if someone gives some links, then it's better not to click on them. Also, before sending cryptocurrency, I check the first and last digits of the wallet.

Exchange Scam
There are good exchanges where people earn money on commissions. But there are sites that work and at one point throw everyone and take your money(and not just yours, but the entire site). And the site bursts like a soap bubble.

In order not to lose the crypt in scam exchanges, you need to trade on large platforms that have been operating for years. Also, it is better not to store money on exchanges. Hardware wallets are suitable for storage.

Replacing the SIM card
There have already been several cases of hackers stealing money by replacing the SIM card.

In order not to lose the crypt in this way, it is better to buy a separate SIM card for all important wallets and not give anyone a phone number.

Here you are and got acquainted with several ways to steal bitcoins and this is not all the ways.
 
Top