Хакери клонирају Веб3 новчанике као што је Метамаск као и Цоинбасе новчаник како би украли криптовалуту

coinbase

  • When it comes to devising attacks to take advantage of cryptocurrency consumers, hackers are becoming increasingly inventive. Confiant, a business committed to assessing the quality of advertisements and the security risks they may represent to internet users.
  • As per the review, these applications are generally conveyed beyond conventional application stores, through joins recognized by clients in web crawlers like Baidu. The investigators believe the cluster is Chinese because of the languages used in the code comments, as well as other factors such as infrastructure location and services used.
  • Confiant classified the cluster, codenamed Seaflower, as one of the most sophisticated strikes of its kind. According to the research, ordinary users will not be able to detect these apps because they are nearly identical to the real apps but feature a different coding that allows hackers to steal the wallets’ seed phrases, giving them access to the funds.

A cluster of fraudulent behavior involving distributed wallet apps has been discovered by Confiant, an advertising security firm, allowing hackers to steal private seeds and gain access to users’ assets via backdoored counterfeit wallets. The apps are distributed via duplicating reputable websites, giving the user the impression that they are downloading an authentic app.

Web3-Enabled Wallets Such As Metamask Are Targeted By A Malicious Cluster

When it comes to devising attacks to take advantage of cryptocurrency consumers, hackers are becoming increasingly inventive. Confiant, a business committed to assessing the quality of advertisements and the security risks they may represent to internet users, has issued a warning about a new type of assault impacting users of popular Web3 wallets such as Metamask and Coinbase Wallet.

Confiant classified the cluster, codenamed Seaflower, as one of the most sophisticated strikes of its kind. According to the research, ordinary users will not be able to detect these apps because they are nearly identical to the real apps but feature a different coding that allows hackers to steal the wallets’ seed phrases, giving them access to the funds.

ПРОЧИТАЈТЕ И - Шта је подивљало гласине о великим ликвидацијама Тхрее Арровс Цапитала?

Recommendations As Well As Dissemination

As per the review, these applications are generally conveyed beyond conventional application stores, through joins recognized by clients in web crawlers like Baidu. The investigators believe the cluster is Chinese because of the languages used in the code comments, as well as other factors such as infrastructure location and services used.

Source: https://www.thecoinrepublic.com/2022/06/15/web3-wallets-such-as-metamask-as-well-as-coinbase-wallet-are-being-cloned-by-hackers-in-order-to-steal-cryptocurrency/