Crypto Drainers are Targeting Cryptocurrency Users

As cryptocurrency becomes more popular and the adoption rises, we see a related increase in the number of cybercrimes, fraud, and malware schemes. Criminals like to hunt and plunder where there is money! If you hold cryptocurrency or are using Web3 platforms, you need to be careful.

Among other risks, the latest method is to use a crypto drainer! Crypto drainers are malicious code injected into software and webpages that compromise the victim’s crypto wallets or secret keys to drain the accounts.

This can be accomplished through:

· Phishing websites, emails, texts, and other social engineering practices

· Fake airdrops, contests, and ads

· Malicious digital contracts

· Fake exchanges, marketplaces, and crypto services

· And malicious or trojanized browser extensions

Crypto drainers are being productionalized for scale within the cybercriminal community, with Drainers-as-a-Service tools being offered to less savvy wannabe fraudsters. These packages include the malicious code, apps, social engineering functions, and back-end infrastructure to handle the unauthorized asset transfers at scale. Some come with management dashboards to oversee the progress of all the victimization, documentation, tutorials, system updates, and customer support!

Kits start at a mere $100, which is a low bar for many of the unscrupulous cybercriminals. The lure of high rewards, low effort, and a small investment will continue to bring many over to the dark side. Personal and corporate cybersecurity practices must be employed.

1*9I6tFwEE8Qe2WHjFupuM1A.jpeg

Some key recommendations for protecting crypto wallets include:

1. Enable multifactor authentication (2FA or MFA) when available on your wallets

2. Use hardware wallets or cold wallets for maximum security

3. Don’t be phished or socially engineered! Never click a questionable link, install untrusted software, or provide your private keys!

4. Avoid browser extensions! They can hijack your webpages and anything you input on them.

5. Secure your seeds and private keys in a password manager or offline.

Watch your wallets for unusual activity — although if you see any, it will likely be too late for that wallet!

Cryptocurrency is great, but like any innovative and disruptive technology, the attackers are motivated to find creative ways to victimize users! Understand the risks, act securely, and be cautious.

 

 

 

 

For more Cybersecurity Insights, follow me on:

Votes: 0
E-mail me when people leave their comments –

CISO and Cybersecurity Strategist

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership