According to analytical reports, the number of breakouts of cryptocurrency exchanges has increased 4 times over the past two years. Most often, fraudsters steal Bitcoins from users' wallets, using increasingly sophisticated schemes, which even experienced market participants fall for. Let’s consider some of them.
Intervention in application infrastructure. Almost all cryptocurrency wallets are periodically updated and users receive a message that they need to download the update. When downloading an update, the user download the viral wallet that stole customer’s data. After the user makes the transfer, the funds are transferred to the fraudsters' wallet. A similar situation was done with the Electrum wallet, when bitcoins were stolen from many customers, and their money went to the burglars' wallets. They managed to solve such a scheme only after dozens of transactions began to disappear in an unknown direction.
Chrome extensions. The browser constantly adds various extensions to its panel and crypto fraudsters did not fail to take advantage of it. They created the Razy Trojan. It penetrated through advertising and was intended to install a malicious extension that transmitted user data, in particular the address of the crypto wallet. After the address were found, the extension changes it and bitcoins or another cryptocurrency went into the account of intruders. Detection of the Trojan was not soon, after the browser began to produce errors in the identification of users. Docker containers. Analysts have discovered many Docker containers, through which computers were infected, and then mining and the theft of bitcoins were attempted. Such containers penetrated through the search engine Shodan, and getting to the client's computer were engaged in hidden mining. Basically, bitcoin and Monero were illegally mined. In addition, containers could attack intranets and steal user’s data.
Even the experienced market participants could not figure out all the indicated schemes, since hackers created complex applications and masked their extensions so that they are almost indistinguishable from official ones. How many bitcoins were stolen is unknown. Analysts suggest that cryptocurrency depreciation schemes will become more sophisticated and cunning. Users only need to constantly monitor the situation, update security systems and store their funds on hardware wallets.