Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Are Hackers Two Steps Ahead of Security in a Cat-and-Mouse Game? Experts Answer
Disclosure: Crypto is a high-risk asset class. This article is provided for informational purposes and does not constitute investment advice. By using this website, you agree to our terms and conditions. We may utilise affiliate links within our content, and receive commission.
Source: AdobeStock / aLListar/peopleimages.comTalking with Cryptonews, Raz Niv, co-founder and CTO at the Web3 security company Blockaid, and Kate Kurbanova, co-founder of risk management firm Apostro, discussed the evolution and high adaptability of crypto thieves, the “ingenious” methods attackers employ to empty our crypto wallets, what we can do to protect our own money, and steps to take if we do fall victim to theft.
This is what the experts told us.
Security and Threats: Continuous Cat-And-Mouse Game
Blockaid’s Raz Niv opined that hackers are not necessarily always a couple of steps ahead of security. Rather, attackers are highly adaptable.
Niv said,
This ability is evident in the evolution of attack methods, he said. It went from direct Ethereum transfers to approvals, then to offline signatures, and recently, to malicious airdrops.
Bad actors will observe the innovations in the eco closely. And they will adapt by skillfully incorporating these innovations in ways that serve their own interests.
However, Niv remarked,
Apostro’s Kate Kurbanova noted an “unfortunate lack of awareness” often exhibited by the average crypto user. It “frequently results in vulnerabilities that fraudsters are all too happy to exploit.”
A vital factor for ensuring the security of users’ finances is the crypto industry spreading knowledge and awareness of how to download and manage crypto apps correctly, Kurbanova said.
Most Popular Hacker Tactics
There are four “ingenious” methods hackers commonly employ to empty crypto wallets, Blockaid found.
These are:
Kurbanova, too, warned about counterfeit websites. Scammers often fabricate platforms that mirror legitimate decentralized finance (DeFi) protocols to trick unsuspecting users into divulging sensitive information or transferring their valuable assets to malicious addresses.
Therefore, verifying the authenticity of websites before engaging in any transactions is crucial.
Niv also noted an emerging attack vector: inbound malicious tokens. These are the “spammy” non-fungible tokens (NFTs) that appear in users’ wallets or the random spam tokens that may look similar to a legitimate project. However, these will attempt to trigger users’ actions that ultimately have them sign a malicious transaction.
The most used methods, added Niv, are to wash-rinse-and-repeat the same attack type by impersonating different individuals or entities hoping to scam an unsuspecting user.
Kurbanova further warned against conducting any transactions via or connecting your wallets to public Wi-Fi. She stated that,
Similarly, do not use USB ports in public areas, as you can become a victim of what is known as ‘juice hacking.’ Criminals use corrupted ports to upload malware to devices and steal personal data and passwords.
Protect-Your-Funds Starter Pack
As crypto holders, we can’t settle for half-measures but must take security practices very seriously, Kurbanova says. And though it may seem daunting, there are some basic, simple measures each of us – newbie and veteran alike – should take.
Kurbanova warns against storing funds in crypto apps, saying:
Ideally, she said, you should get a cold wallet and separate your crypto into several different wallets with different private keys.
Furthermore, do not use an app for any crypto operation before you’ve done in-depth research. Check when the app appeared on the market, its development history, the team behind it, and user feedback.
If something comes even close to your money, you must know it well.
Never use the same password for more – or even worse, all – of your apps. Also, change your passwords regularly. “Once per month should do it,” Kurbanova advised.
Employ two-factor authentication (2FA) whenever possible. As said, stay away from public Wi-Fi and USB ports.
Finally, make sure all your apps are updated with the latest security patches. Update your device’s operating regularly as well.
Theft Already Happened, Now What?
Kurbanova warned there is no such thing as a completely foolproof method of safeguarding against attacks. Attackers may find a way to get to your funds.
If you suspect this has happened, first, don’t panic. Move all remaining funds to a new wallet.
Refresh/relaunch the app and check for updates in the settings. Change all your passwords and reinforce security.
Check the wallet’s website and social media for hacker s and security-related information.
You can also check their wallets through a token tracker like Etherscan to see whether their coins are accounted for. If there are unauthorized transactions, report them to the wallet provider.
If (some) funds are missing, Kurbanova also suggests seeking out the services of cybersecurity firms that specialize in monitoring suspicious blockchain addresses and transactions. These can track digital assets, she said, adding:
Unfortunately, as we know from numerous theft stories, the success of fund retri ies from case to case – and you should probably let the police take over.
However, let’s do the best we can to protect our own assets so that this scenario (hopefully) never happens.
____
Learn more: This is How You Protect Crypto in Your Wallet, According to Expert Mark Venables