{"id":24312,"date":"2023-10-30T09:18:04","date_gmt":"2023-10-30T09:18:04","guid":{"rendered":"https:\/\/nftandcrypto-news.com\/crypto\/3-unique-ways-hackers-are-stealing-your-crypto-bitrace-report\/"},"modified":"2023-10-30T09:18:06","modified_gmt":"2023-10-30T09:18:06","slug":"3-unique-ways-hackers-are-stealing-your-crypto-bitrace-report","status":"publish","type":"post","link":"https:\/\/nftandcrypto-news.com\/crypto\/3-unique-ways-hackers-are-stealing-your-crypto-bitrace-report\/","title":{"rendered":"3 unique ways hackers are stealing your crypto: Bitrace Report"},"content":{"rendered":"

<\/p>\n

\n

To track down and counter the sudden disappearance of tokens from crypto wallets requires investors to know the various ways bad actors use to steal cryptocurrencies successfully.\u00a0<\/p>\n

Blockchain investigator Bitrace has\u00a0identified three effective ways hackers gain access to crypto investors\u2019 wallets: through search engines, such as Google and Bing, pasteboard hijacking and liquidity mining and coin theft.<\/p>\n

Crypto investors claiming \u201cmy coins disappeared suddenly\u201d have been found to have recently downloaded crypto applications from unverified sources. Attackers use search engine optimization (SEO) techniques to rank higher on internet searches, unknowingly coercing users to download and sign up to fake apps with backdoors. <\/p>\n

Pasteboard hijacking involves the process of automatically grabbing or modifying previously copied text data from clipboards. The technique often skims seed phrases of users, which can be used later to access wallets and drain funds. Bitrace highlighted how a fake Telegram app was being used to replace the destination wallet address copied in the clipboard, causing users to send their tokens to the hacker.<\/p>\n

Finally, the classic \u201chigh yield and low risk\u201d liquidity scams also ranked as one of the three most popular scams resulting in the disappearance of tokens. Bitrace recommended three methods crypto users could use to trace the stolen funds, starting with tracing the transaction fees. Investigators often find the hacker\u2019s address by tracking down the source of the transaction fees that were paid to move the stolen funds.<\/p>\n

Other ways investors can improve their chances of retrieving stolen funds include using blockchain explorers and professional tools. To learn more about how to track stolen crypto, read Cointelegraph Research\u2019s article on how blockchain analysis helps recover funds.<\/p>\n

Related: <\/em><\/strong>Crypto thief steals $4.4M in a day as toll rises from LastPass breach<\/em><\/strong><\/p>\n

In addition to targeting investors, attackers often steal funds from crypto organizations as well. As part of the remediation of a recent exploit, Maestrobots \u2014 a group of cryptocurrency bots on the Telegram messenger app \u2014 paid a total of 610 Ether (ETH) of its own revenue to cover all the user losses, which amounted to more than $1 million.<\/p>\n

\n

Wrapping up the Exploit Saga<\/p>\n

\u27a1\ufe0f First things first:<\/p>\n

Maestro: Router 2 was exploited about 10 hours ago on ETH Mainnet, and some tokens (not ETH) were siphoned away. Within 30 minutes of the start of the attack, our team identified and fully removed the exploit. If you’re\u2026<\/p>\n

\u2014 Maestro (@MaestroBots) October 25, 2023<\/a><\/p><\/blockquote>\n

Blockchain security firm CertiK confirmed to Cointelegraph that it had detected the transactions showing the 334 ETH compensation paid out to users from Maestro. \u201cMost of these tokens pumped back up due to the anticipation that we were gonna market buy the tokens. Most of these tokens are still alive and kicking,\u201d a spokesperson for Maestrobots told Cointelegraph.<\/p>\n

Magazine:\u00a0Ethereum restaking: Blockchain innovation or dangerous house of cards?<\/strong><\/em><\/p>\n<\/div>\n