{"id":21278,"date":"2023-06-23T09:44:30","date_gmt":"2023-06-23T05:44:30","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/21278\/"},"modified":"2023-06-23T09:44:30","modified_gmt":"2023-06-23T05:44:30","slug":"top-eight-crypto-scams-2023","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/21278\/","title":{"rendered":"Eight of the most daring crypto thefts in history"},"content":{"rendered":"<p>The advantages of cryptocurrencies for owners \u2014 lax regulation and lack of government control \u2014 are major pluses for cyberthieves too. Because the threats to crypto assets are quite varied, we recommend that you study our <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">overview of how to protect your crypto investments<\/a>, as well as our <a href=\"https:\/\/www.kaspersky.com\/blog\/five-threats-hardware-crypto-wallets\/47971\/\" target=\"_blank\" rel=\"noopener nofollow\">tips for owners of hardware cryptowallets<\/a>. But these posts of ours, detailed as they are, still do not disclose the full variety or scale of crypto-related scams. To give you a better grasp of just how attractive crypto finance is to scammers, we\u2019ve compiled a list of the most striking examples of attacks in recent years. Our police lineup (of cybercriminals) shows you the biggest, most brazen attacks in different categories. We didn\u2019t rank them by damage, as this is hard to determine for many types of attacks, and our rating excludes <a href=\"https:\/\/edition.cnn.com\/2022\/02\/27\/business\/bitconnect-ponzi-scheme-satish-kumbhani\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">pyramid schemes like BitConnect<\/a>.<\/p>\n<h2 id=\"sophisticated\">1. The most sophisticated<\/h2>\n<p><strong>Damage: US$30\u00a0000<\/strong><br>\n<strong>Method: Trojanized hardware wallet<\/strong><\/p>\n<p>This attack was investigated by our experts, hence we have a <a href=\"https:\/\/www.kaspersky.com\/blog\/fake-trezor-hardware-crypto-wallet\/48155\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed post<\/a> about it. An investor purchased a popular hardware wallet, which looked and worked exactly like a real one \u2014 until it didn\u2019t. It turned out to be a very crafty fake with pre-flashed private keys known to the cybercriminals and a password-weakening system. When money appeared in the wallet, the hackers simply withdrew it. And that\u2019s without the wallet ever connecting to a computer.<\/p>\n<h2 id=\"biggest\">2. The biggest<\/h2>\n<p><strong>Damage: US$540\u00a0000\u00a0000<\/strong><br>\n<strong>Method: server hack <\/strong><\/p>\n<p>For a long time, the largest hack in cryptocurrency history was the theft from <a href=\"https:\/\/buybitcoinworldwide.com\/mt-gox-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">Mt. Gox exchange of US$460 million<\/a>, which caused the exchange to collapse in 2014. But in 2022 this dubious honor passed to Sky Mavis, developer of the popular play-to-earn game Axie Infinity. The attackers compromised the Ronin Bridge system, which handles the interaction between in-game tokens and the Ethereum network, which led to the <a href=\"https:\/\/www.kaspersky.com\/blog\/sky-mavis-crypto-heist\/44981\/\" target=\"_blank\" rel=\"nofollow noopener\">theft of ether and USDC<\/a> worth, according to various estimates, US$540\u2013650 million. Without delving into the details of the blockchain bridge hack, the attackers compromised five of the nine validator nodes for verifying Ronin transactions and used them to sign their transfers. Apparently, the network was infiltrated through a combination of malware and legitimate but outdated access credentials that had not been revoked in time.<\/p>\n<p>The hackers also hoped to earn even more from the collapse in the market capitalization of the target companies, but the hack was noticed just a week later, and their attempt at short selling failed.<\/p>\n<h2 id=\"persistent\">3. The most persistent<\/h2>\n<p><strong>Damage: unknown<\/strong><br>\n<strong>Method: fake Chrome extension<\/strong><\/p>\n<p>The attacks, carried out by the BlueNoroff group and <a href=\"https:\/\/www.kaspersky.com\/blog\/snatchcrypto-bluenoroff\/43412\/\" target=\"_blank\" rel=\"noopener nofollow\">detected by us in 2022<\/a>, were aimed primarily at FinTech companies working with cryptocurrency. In this series of attacks, the hackers penetrated the internal networks of the target companies using phishing emails seemingly from venture capital funds. When the victim opened the malicious email attachment, a Trojan installed itself on the computer allowing the attackers to steal information and install additional malware. If the company\u2019s emails were of interest to them, the hackers remained in its network for months. Meanwhile, the crypto theft itself was carried out using a modified Chrome extension called Metamask. By installing their version of Metamask instead of the official one, the cybercriminals were able to observe and modify the victim\u2019s legitimate cryptocurrency transactions; even the use of a hardware cryptowallet in this case didn\u2019t provide sufficient protection.<\/p>\n<h2 id=\"obscure\">4. The most obscure<\/h2>\n<p><strong>Damage: US$35\u00a0000\u00a0000<\/strong><br>\n<strong>Method: unknown<\/strong><\/p>\n<p>On June 2, 2023, <a href=\"https:\/\/twitter.com\/zachxbt\/status\/1665267820836319233\" target=\"_blank\" rel=\"nofollow noopener\">attackers targeted<\/a> the decentralized Atomic Wallet, debiting tokens from the victim. This is the most recent example at the time of posting. The developers <a href=\"https:\/\/twitter.com\/AtomicWallet\/status\/1665550651735023616\" target=\"_blank\" rel=\"nofollow noopener\">confirmed the hack<\/a>, but have yet to figure out how it was done. Atomic Wallet prides itself on the fact that neither passwords nor private keys are stored on its servers, so the attack must be linked to what takes place on users\u2019 computers.<\/p>\n<p>Cryptocurrency tracking experts say the laundering methods used resemble the modus operandi of the Lazarus group. If it is Lazarus, it\u2019s most likely an attack either through a fake Trojanized version of Atomic Wallet (similar to the <a href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-defi-wallet-backdoor\/44138\/\" target=\"_blank\" rel=\"noopener nofollow\">attack on DeFi<\/a>), or on the developers themselves with a Trojan in the official application.<\/p>\n<h2 id=\"cinematic\">5. The most cinematic<\/h2>\n<p><strong>Damage: US$4\u00a0000\u00a0000<\/strong><br>\n<strong>Method: face-to-face meeting<\/strong><\/p>\n<p>To steal cryptocurrencies, some cybercriminals set up <em>Catch Me If You Can<\/em>-style scams. The targets \u2014 companies looking for investors \u2014 are approached by \u201cinvestment funds\u201d to discuss a potentially large investment in the business. After a few phone calls and emails, face-to-face meetings are scheduled at a luxury hotel with the victims \u2014 startup CEOs. There, all legal and financial matters are discussed at length, after which, under a convenient pretext, the conversation turns to investments and cryptocurrency fees. As a result, the scammers sneak a peek on the victim\u2019s seed phrase or briefly get hold of their cryptowallet, emptying it of all funds. In one case, the victims were hustled for <a href=\"https:\/\/www.theregister.com\/2023\/02\/08\/webaverse_crypto_stolen\/\" target=\"_blank\" rel=\"nofollow noopener\">US$4 million<\/a>; in another, <a href=\"https:\/\/www.theregister.com\/2023\/02\/16\/fake_crypto_investor_scam\/\" target=\"_blank\" rel=\"nofollow noopener\">described in detail<\/a>, for US$206 000.<\/p>\n<h2 id=\"elegant\">6. The most elegant<\/h2>\n<p><strong>Damage: unknown<\/strong><br>\n<strong>Method: fake letters and wallets<\/strong><\/p>\n<p>This one sounds like a plot for a detective novel: cybercriminals sent <em>paper<\/em> letters to buyers of Ledger hardware wallets. To get the mailing list, they either hacked into an unnamed third party (likely a Ledger contractor) or capitalized on an earlier user-data leak.<\/p>\n<p>The letter informed the recipient that, due to security issues, their Ledger Nano X hardware wallet had to be replaced \u2014 and a free replacement wallet under warranty was handily attached to the letter. In fact, the enclosed box contained a malware-infected flash drive disguised as a Nano X. On first startup, the program asked the victim to perform a \u201ckey import\u201d and enter their secret seed phrase to restore access to the wallet \u2014 with obvious consequences. Many recipients, however, didn\u2019t fall for the ruse: despite the convincing packaging, the letter itself contained a number of spelling mistakes. Vigilance pays dividends!<\/p>\n<h2 id=\"inconspicuous\">7. The most inconspicuous<\/h2>\n<p><strong>Damage: unknown<\/strong><br>\n<strong>Method: malware<\/strong><\/p>\n<p>Among the most inconspicuous are <a href=\"https:\/\/securelist.com\/copy-paste-heist-clipboard-injector-targeting-cryptowallets\/109186\/\" target=\"_blank\" rel=\"noopener\">address-substitution attacks<\/a>, usually carried out with the help of clipboard-injector malware. After infecting the victim\u2019s computer, the malware silently monitors the clipboard for cryptowallet addresses: when one arrives, malware replaces it with the address of the attacker\u2019s wallet. So, by simply copying and pasting addresses during transfers, cybercriminals can easily direct funds their way.<\/p>\n<h2 id=\"hurtful\">8. The most hurtful<\/h2>\n<p><strong>Damage: US$15 000<\/strong><br>\n<strong>Method: love letters<\/strong><\/p>\n<p>Romantic scams remain one of the most common ways to deceive private crypto investors. Let\u2019s take a look at a specific example. Kevin Kok had years of crypto experience, yet even <a href=\"https:\/\/www.wptv.com\/news\/local-news\/investigations\/boynton-beach-man-warns-others-after-losing-15-000-in-cryptocurrency-scam\" target=\"_blank\" rel=\"nofollow noopener\">he was hoodwinked by a blossoming romance<\/a>. Having met a woman on a dating site, he chatted with her for several months, during which time the topic of investments never arose. Then, she suddenly shared \u201cinformation from friends\u201d about a handy new app for crypto investments. She was having trouble figuring it out and asked for help so she could deposit her own (!) money there. Kevin, of course, offered to help. Convinced that the app was working fine, he saw his new flame\u2019s assets rise in value. So he decided to invest his own money and smiled at the high rate of return. Kevin became suspicious only when the woman suddenly disappeared from all messenger apps and stopped replying to his messages. And it was then he discovered it wasn\u2019t possible to withdraw funds from the \u201cinvestment system.\u201d<\/p>\n<h2 id=\"stay_safe\">How to stay safe?<\/h2>\n<p>We\u2019ve already given <a href=\"https:\/\/www.kaspersky.com\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/47811\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed recommendations for crypto investors<\/a>, so here we\u2019ll repeat just two: treat all crypto-related offers, emails, letters and innocent questions with maximum suspicion, and always use security software tailored for crypto investments on all relevant devices. And we certainly recommend a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> subscription for one or more devices, the price of which is a drop in the ocean compared to the potential damage from just one successful scam. Premium includes special tools to protect your crypto investments:<\/p>\n<ul>\n<li>Protection against cryptocurrency fraud and unauthorized mining<\/li>\n<li>Additional protection for banking apps and financial transactions<\/li>\n<li>Anti-phishing<\/li>\n<li>Special anti-keylogger protection for password input windows<\/li>\n<li>Detection of remote access to the computer<\/li>\n<li>Password manager and secure storage for sensitive data<\/li>\n<li>Real-time antivirus with application behavior control<\/li>\n<li>Warnings about potentially dangerous applications<\/li>\n<li>Automatic search for outdated versions of applications and updates from official sources<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-fraud\">\n","protected":false},"excerpt":{"rendered":"<p>Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.<\/p>\n","protected":false},"author":2722,"featured_media":21279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[374,1308,1505,1739,1504,2578,187,695,201,521,131],"class_list":{"0":"post-21278","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-blockchain","10":"tag-cryptocurrencies","11":"tag-cryptowallet","12":"tag-ethereum","13":"tag-nft","14":"tag-passwords","15":"tag-scam","16":"tag-theft","17":"tag-threats","18":"tag-tips"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/21278\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-eight-crypto-scams-2023\/25837\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/10842\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/28535\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-eight-crypto-scams-2023\/26136\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/26480\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top-eight-crypto-scams-2023\/28959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top-eight-crypto-scams-2023\/27875\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top-eight-crypto-scams-2023\/35628\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top-eight-crypto-scams-2023\/11549\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/48489\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top-eight-crypto-scams-2023\/20788\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top-eight-crypto-scams-2023\/21474\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top-eight-crypto-scams-2023\/30308\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top-eight-crypto-scams-2023\/34204\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top-eight-crypto-scams-2023\/26451\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-eight-crypto-scams-2023\/32146\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-eight-crypto-scams-2023\/31830\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cryptocurrencies\/","name":"cryptocurrencies"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21278"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21279"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}