To Steal Cryptocurrency, Hackers Create Similar Open Source Apps


Phishing assaults have already been demonstrated to be a threat to all types of PC users in 2022, but they are particularly prevalent in the crypto and NFT industries. Scammers have already used Discord to attempt to steal bitcoins and NFTs in the OpenSea phishing scheme.

Trezor, a bitcoin wallet service, is now being targeted by hackers. Trezor’s email list was used to target customers and fool them into downloading a fraudulent version of the programme aimed to steal their crypto assets, according to Bleeping Computer.

The original Trezor software is open source, which means that the code can be downloaded and modified by others in this situation. Because it still displays the Trezor banner warning clients to beware of phishing scams, it’s likely that this spoofed version is only slightly different from the original.

When the software is installed, it prompts the user for a recovery phrase, which they should have entered when they first set up their wallet. This recovery phrase serves as a key to regaining access to the wallet if it is misplaced. It’s game over once the user enters the key. The scammers will receive the recovery phrase and will be able to claim all of your crypto assets.

When it comes to phishing scams, distinguishing a reputable site or programme from a phoney can be quite difficult. Due to the usage of unusual characters, even the websites related with the download for this fraud appeared authentic. It’s usually a good idea to double-check anything that requests a security key or password; there are definitely dragons lurking about.

Trezor believes that this particular dragon was co-opted for malevolent motives and targeted one of its newsletters hosted on the automated email provider Mailchimp. Mailchimp admitted that an insider had targeted crypto firms, according to Trezor, but the company has yet to publish a statement on the matter.

For the time being, it’s essential to treat every email with caution and double-check everything before handing over any information or installing things on your computer. If something appears suspicious, logging into the service normally from a different browser or system is always a good idea. Avoiding difficulty by painstakingly typing URLs rather than clicking on them and double-checking them against a known website.

With so many hacks targeting crypto currencies in particular, it’s possible that ignoring them altogether is the best way to keep safe in these perilous times.


Please enter your comment!
Please enter your name here