Cybercriminals most often resort to three methods of stealing digital assets: fake applications, clipboard address spoofing, and liquidity fraud. This was reported by analysts Bitrace.
In the case of fake crypto apps, hackers promote them in search results to outrank legitimate programs. They gain access to wallets via built-in backdoors.
Fake apps, alongside individual malware in the transaction flow, can replace the recipient’s address copied to the clipboard with the attacker’s address.
In the liquidity fraud scheme, victims are promised a stable income after funding the wallet with a certain amount. In reality, the malware embedded in the smart contract code grants the hacker permission to withdraw the user’s funds.
Experts advised caution when investing in cryptocurrencies, and, in the event of theft, to use analytics tools to track the funds.
Earlier, Bitrace found that over two years more than 3.4 billion USDT flowed into off-exchange wallets on the Tron network, of which 54.2% are linked to high-risk operations.
