Six Tools Used by Hackers to Steal Cryptocurrency: How to Protect Wallets

pubblicato su by Cointele | pubblicato su

31 percent of respondents rate the hackers' activity threat to the global cryptocurrency industry as very high.

Surprisingly, the article "Smart hacking tricks" that was published by Hackernoon didn't appear to get wide popularity and warnings that seem to be obvious for an ordinary cryptocurrency user must be repeated again and again, as the number of cryptocurrency holders is expected to reach 200 million by 2024, according to RT. According to research conducted by ING Bank NV and Ipsos - which did not consider East Asia in the study - about nine percent of Europeans and eight percent of U.S. residents own cryptocurrencies, with 25 percent of the population planning to buy digital assets in the near future.

Hackers add applications on behalf of certain cryptocurrency resources to the Google Play Store.

One of the most famous targets of a hacking attacks of this type were traders of the American cryptocurrency exchange Poloniex, which downloaded mobile applications posted by hackers on Google Play, pretending to be a mobile gateway for the popular crypto exchange.

More often, hackers create a bot that notifies users about problems with their cryptos.

The largest successful attack by hackers through Slack is considered to be the Enigma group hack.

After carrying out an elementary KRACK attack the user's device reconnects to the same Wi-Fi network of hackers.

Cryptojacking, hidden mining and common sense The good news is that hackers are gradually losing interest in brutal attacks on wallets because of the growing opposition of cryptocurrency services and the increasing level of literacy of users themselves.

The method is called "Cryptojacking" and it has fascinated hackers with its simplicity in such away that they massively took up its implementation, abandoning the traditional extortion programs.

This is the first time when hackers demonstrated such a huge database of cryptocurrency owners - so far, such programs have contained a very limited set of addresses for substitution.

x