Carding 4 Carders
Professional
- Messages
- 2,724
- Reaction score
- 1,588
- Points
- 113
Cybercriminals most often resort to three methods of stealing digital assets: fake applications, spoofing addresses in the clipboard, and liquidity fraud. This was reported by Bitrace analysts.
In the case of fake crypto applications, hackers promote them in search results in order to overtake legitimate programs in terms of rating. They get access to their wallets through built-in backdoors.
Fake applications, along with individual malicious programs, can change the recipient's address copied to the clipboard to the attacker's account during transactions.
In a fraudulent scheme with liquidity, victims are promised a stable income after adding a certain amount to their wallet. In fact, the malware built into the smart contract code gives the hacker permission to withdraw user funds.
Experts recommended to be careful when investing in cryptocurrencies, and in case of theft, use analytics tools to track funds.
Earlier, Bitrace found out that over two years, over-the-counter wallets received more than 3.4 billion USDT in the Tron network, of which 54.2% are related to high-risk operations.
In the case of fake crypto applications, hackers promote them in search results in order to overtake legitimate programs in terms of rating. They get access to their wallets through built-in backdoors.
Fake applications, along with individual malicious programs, can change the recipient's address copied to the clipboard to the attacker's account during transactions.
In a fraudulent scheme with liquidity, victims are promised a stable income after adding a certain amount to their wallet. In fact, the malware built into the smart contract code gives the hacker permission to withdraw user funds.
Experts recommended to be careful when investing in cryptocurrencies, and in case of theft, use analytics tools to track funds.
Earlier, Bitrace found out that over two years, over-the-counter wallets received more than 3.4 billion USDT in the Tron network, of which 54.2% are related to high-risk operations.