SlowMist, a company operating in the field of blockchain security, has published its analysis of security events for the fourth quarter of 2025.
The report warned users about a recent resurgence in malware attacks and a new, more sophisticated phishing method.
According to SlowMist, attackers are using a new technique called “browser history poisoning.” In this method, even if users manually type the correct domain name of an official platform, the browser’s autocomplete feature can redirect them to a fake website. Some victims have reported entering the address correctly, but the browser automatically completed a pre-created, fake domain name.
The report specifically stated that this was not due to user error. It explained that the attackers “poisoned” the browser history beforehand through advertisements, social media redirects, or fake announcements, allowing the fake domain name to be saved in the browser’s autocomplete system. When the user types the same address again, the browser automatically redirects them to the phishing site, which has an interface almost identical to the official site.
On the other hand, SlowMist noted a significant resurgence in malware attacks targeting computers. Attackers typically install malware silently on users’ devices through phishing links, private messages sent via social media, or files disguised as “resource/tool downloads.” A warning was issued that if a device is compromised, data, particularly that belonging to cryptocurrency wallets, is at serious risk.
SlowMist stated that users should not blindly trust browser autocomplete suggestions, should open links directly from bookmarks, and should be extremely cautious about files and links from unknown sources.
*This is not investment advice.