Slowmist’s MistTrack’s Stolen Funds Analysis shows that private key leaks remain the most common cause of crypto 0 findings indicate that 317 stolen fund reports were filed between July and September with assets worth more than $3.73 million successfully frozen or recovered in ten of those 1 Keys Remain the Core Vulnerability The report highlights that most crypto thefts rely on compromised credentials rather than sophisticated 2 notes that unauthorized dealers continue to sell fake hardware wallets which remain a common 3 devices often contain pre-written seed phrases or have been tampered with to secretly capture recovery information allowing attackers to access funds once victims deposit 4 advised users to only purchase hardware wallets through authorized vendors
create seed phrases on their device and try tiny transfers before transferring large sums of 5 checks such as verifying packaging integrity and avoiding pre-set recovery cards can help prevent 6 are also developing new methods using phishing and social 7 report examined some occurrences of EIP-7702 delegate phishing
where compromised accounts were linked to contracts that automatically drained assets once a transfer was 8 such cases victims believed they were engaging in regular activity but hidden authorizations allowed hackers to gain 9 analysis shows that social engineering remains a persistent threat with phishers posing as recruiters on LinkedIn and building trust with job candidates over several weeks before convincing them to install “camera drivers” or other malicious 10 one case
attackers paired the program with a manipulated Chrome extension during a Zoom call leading to losses of more than $13 11 Phishing Scams Remain Effective Traditional methods also continued to prove 12 Google ads cloned legitimate services such as MistTrack while spoofed dashboards for decentralized finance platforms like Aave generated over $1.2 million in losses through hidden authorization 13 exploiters also hijacked unused Discord vanity links left in project folders to trick 14 attack vector disguises malicious commands as CAPTCHA verifications tricking victims into copying code that steals wallet data
browser cookies and private 15 explained that Web3 exploits are not about complex tricks but involve hackers taking advantage of everyday 16 being said simple actions like slowing down double-checking sources
and avoiding shortcuts are the best ways to stay safe in a space where threats keep changing.
Story Tags

Latest news and analysis from Crypto Potato