en
Back to the list

Web3 Wallets Such As Metamask As Well As Coinbase Wallet Are Being Cloned By Hackers In Order To Steal Cryptocurrency

source-logo  thecoinrepublic.com 15 June 2022 22:00, UTC
  • When it comes to devising attacks to take advantage of cryptocurrency consumers, hackers are becoming increasingly inventive. Confiant, a business committed to assessing the quality of advertisements and the security risks they may represent to internet users.
  • As per the review, these applications are generally conveyed beyond conventional application stores, through joins recognized by clients in web crawlers like Baidu. The investigators believe the cluster is Chinese because of the languages used in the code comments, as well as other factors such as infrastructure location and services used.
  • Confiant classified the cluster, codenamed Seaflower, as one of the most sophisticated strikes of its kind. According to the research, ordinary users will not be able to detect these apps because they are nearly identical to the real apps but feature a different coding that allows hackers to steal the wallets’ seed phrases, giving them access to the funds.

A cluster of fraudulent behavior involving distributed wallet apps has been discovered by Confiant, an advertising security firm, allowing hackers to steal private seeds and gain access to users’ assets via backdoored counterfeit wallets. The apps are distributed via duplicating reputable websites, giving the user the impression that they are downloading an authentic app.

Web3-Enabled Wallets Such As Metamask Are Targeted By A Malicious Cluster

When it comes to devising attacks to take advantage of cryptocurrency consumers, hackers are becoming increasingly inventive. Confiant, a business committed to assessing the quality of advertisements and the security risks they may represent to internet users, has issued a warning about a new type of assault impacting users of popular Web3 wallets such as Metamask and Coinbase Wallet.

Confiant classified the cluster, codenamed Seaflower, as one of the most sophisticated strikes of its kind. According to the research, ordinary users will not be able to detect these apps because they are nearly identical to the real apps but feature a different coding that allows hackers to steal the wallets’ seed phrases, giving them access to the funds.

ALSO READ – What made rumors of Three Arrows Capital’s massive liquidations go wild?

Recommendations As Well As Dissemination

As per the review, these applications are generally conveyed beyond conventional application stores, through joins recognized by clients in web crawlers like Baidu. The investigators believe the cluster is Chinese because of the languages used in the code comments, as well as other factors such as infrastructure location and services used.

thecoinrepublic.com