visit
Phishing means clone websites created by cybercriminals to extract your personal data. In the case of cryptocurrency, these are private wallet keys. Today, this is one of the most common and profitable types of fraud in the crypto world. Although now, its share in the total cybercrime number is decreasing. In 2017, this figure was 88%, and in 2018 it was less than 39%. But the danger is still there, so be prepared. Crypto criminals are attacking wallets on exchanges as well as cryptocurrency buying platforms.
A trojan is a virus that infiltrates the system under the guise of licensed software. How does this apply to cryptocurrency?
They are also called keyloggers. This tool records everything you type on your keyboard. Accordingly, such a spy also writes passwords, including keys to your wallet. Your antivirus program already has protection from all known keyloggers, except that they multiply like mushrooms after the rain.
Public Wi-Fi is one of the most popular tools for cybercriminals. After all, authorized users actually gain access to your information. Hackers went further and learned to reconnect devices to their Wi-Fi networks. And now all hands in their hands: what you have going on as well as what passwords and keys you have there. All this becomes known to them.
They send notifications to the user that something has happened to their wallet. The primary purpose is for the user to click on the button and enter a secret code.
This threat concerns all Android users in the first place. Attackers create their applications and place them on Google Play, where verification is more lenient than on the App Store. The apps mimic crypto wallets or exchanges, through which fraudsters get the owners' personal data. And later, on the official websites (real exchanges and cryptocurrency wallets), take your crypto. There are even applications that run hidden mining on your device.
There are a lot of them, and all of them are needed to make it easier for you to handle crypto wallets. At the same time, they are almost always highly vulnerable to hacker attacks.