TechEconomy
  • About
  • Privacy Policy
  • Careers
  • Manage Subscriptions
Tuesday, October 3, 2023
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV
No Result
View All Result
Tech | Business | Economy
No Result
View All Result

Home » Almost $30K Stolen via Fake Hardware Wallet, Kaspersky Investigation Shows 

Almost $30K Stolen via Fake Hardware Wallet, Kaspersky Investigation Shows 

Techeconomy by Techeconomy
June 7, 2023
in Digital Assets
0
Samples of Hardware Wallet
Samples of Hardware Wallets

Samples of Hardware Wallet

Sifax
Advertisements

Cryptocurrency investors often turn to hardware wallets as a secure way to store their digital assets, assuming that they are impenetrable.

However, even the most advanced hardware wallets on the market may not be foolproof, and there are still risks associated with using fake or infected devices.

RelatedPosts

Yellow Pay

How Yellow Pay is Unlocking New Opportunities for Africans using Crypto-Powered Payments Solution

October 2, 2023

Crypto: Introducing Bybit’s Perp Protect

September 26, 2023

Kaspersky has shared the details behind the incident of cryptocurrency theft involving a hardware wallet, which resulted in the loss of 1.33 BTC worth $29,585.

Hardware wallets, also known as ‘cold’ wallets, store cryptocurrency keys on a device the size of a USB stick, which must be plugged into a computer to send crypto or interact with decentralised finance protocols.

As a result, these devices are generally considered safer than ‘hot’ wallets that are connected to the Internet at all times.

However, a recent investigation by Kaspersky revealed a rare case of theft of assets from a hardware wallet, demonstrating how cybercriminals are coming up with new tactics to maximise their profits.

The victim did not make any transactions that day, and the cold wallet was not connected to the computer. Thus, the victim did not immediately notice the theft, and the fraudster transferred 1.33 BTC (worth around $29,585) without the victim’s knowledge.

A screenshot of the transaction history of the examined hardware wallet
A screenshot of the transaction history of the examined hardware wallet

Although the copy we studied appeared identical to the original, the device showed signs of malicious tampering upon opening it. Rather than being welded together ultrasonically like genuine hardware wallets, each half of the device was filled with glue and held together with double-sided tape.

Additionally, the wallet had a different microcontroller with read protection mechanisms and the flash memory completely disabled, instead of the original one.

This led the company’s researchers to conclude that the victim had purchased a hardware wallet that had already been infected.

The attackers made only three changes to the original firmware of the bootloader and the wallet itself. They removed the control of protective mechanisms, replaced the randomly generated seed phrase with one of the 20 preset phrases, and used only the first character of any additional password. This gave the attackers a total of 1280 options to pick the key per one wallet.

Thus, the attackers were able to carry out the operation while the disabled crypto wallet was lying in the owner’s safe.

The crypto wallet seemed to work as usual, but from the very beginning, the scammers had complete control over it.

“Hardware wallets have long been considered one of the safest ways to store cryptocurrency, but cybercriminals have found new ways to benefit by selling infected or fake devices to unsuspecting victims. Such attacks are totally preventable. Hence, we strongly advise users to only purchase hardware wallets from official and trusted sources to minimise the risk,” comments Stanislav Golovanov, Cyber Incidents Investigation Expert at Kaspersky.

Advertisements
innovation
AIT
Advertisements
Tags: Hardware Wallets
ShareTweetSend
Previous Post

Stanbic IBTC Bank Updates its Woman-Owned Account ‘Blue Blossom’ to include Male Signatory

Next Post

Nigerian Government Faces 16 Key Demands from Trade Union Congress

Techeconomy

Techeconomy

Related Posts

Yellow Pay
Digital Assets

How Yellow Pay is Unlocking New Opportunities for Africans using Crypto-Powered Payments Solution

by Techeconomy
October 2, 2023
0

Despite the shared cultural and socioeconomic similarities among various African countries, their proximity, and coexistence, the continent is starkly divided...

Read more
Bybit's Perp Protect

Crypto: Introducing Bybit’s Perp Protect

September 26, 2023
Hash and Blockchain

How Does a Hash Help Secure Blockchain Technology?

September 25, 2023
Digital Quality of life

Nigeria Ranks 7th in Africa in Digital Quality of Life, While Ranking 88th Globally

September 20, 2023
Digital Currency Coalition - Nigeria

Again, DCC Calls for regulation of Digital Currency in Nigeria

September 18, 2023
OneCoin Cryptocurrency

OneCoin’s Co-founder Sentenced to 20 Years in Prison

September 14, 2023
Next Post
Trade Union Congress

Nigerian Government Faces 16 Key Demands from Trade Union Congress

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

NEWSLETTER

Subscribe

* indicates required
Techeconomy
Advertisements
Ad 15
ADVERTISEMENT
  • Trending
  • Comments
  • Latest
​Sodiq Tijani Toju Africa

Meet Sodiq Tijani, a Product Expert and Entrepreneur Banking the Unbanked

March 2, 2023
Product Led vs Sales Led Business Models

Product Led vs Sales Led Business Models: What Startups Should Know

January 10, 2023
Samsung Galayx A04e - Cheapest Samsung Phones in 2023

Cheapest Samsung Phones in 2023

September 11, 2023
Sodiq Tijani Youcloudpay

How Sodiq Tijani is Empowering African SMEs for Economic Growth

February 9, 2022
Google Cybersecurity Scholarship

Google Recognizes Shortage of Cybersecurity Experts in Africa, Announces Scholarships

22

Ad Dynamo Has Eyes on Nigeria – CEO

19

Digital Marketing in Africa: Bringing Much-Needed Skills to Nigeria’s Youth

16

Ad Dynamo by Aleph Group Launches free Digital Academy

14
Jumia

Starlink Partners Jumia for Retail Distribution Across African Markets

October 3, 2023
IHS Towers wins Big in Tech Innovation Awards 2023

IHS Towers wins Big in Tech Innovation Awards 2023

October 3, 2023
OPay Reacts to Viral Video, Allegations of Fraud

OPay Reacts to Viral Video, Allegations of Fraud

October 3, 2023
Change management

Successful Change Management Requires an Awareness of Built-in Resistance 

October 3, 2023

Follow Us

MarkTECH

Adeola Adejokun on MarkTech - Music and Marketing
MarkTECH

Is Music and Marketing Truly a Match Made in Heaven?

by Techeconomy
October 1, 2023
0

Writer: ADEOLA ADEJOKUN Ah, the sweet melodies of music - a global language spoken and understood by almost everyone, everywhere....

Read more

WomenPreneurs

Hiring in South Africa by Jessica Hawkey redAcademy
WomenPreneurs

Women in Business: Q&A with Jessica Hawkey, Founder & MD of redAcademy

by Techeconomy
August 22, 2023
0

"Jessica Hawkey is the Managing Director of redAcademy"

Read more

BusinesSENSE For SMEs

Managing Difficult Customer
BusinesSENSE For SMEs

Five Keys to Managing Difficult Customers

by Techeconomy
August 23, 2023
0

You will at one point in your business be confronted with dealing with difficult customers. So, mastering the right strategies...

Read more
  • About Us
  • Career
  • Contact Us
  • Policy
  • en English
    • ar Arabic
    • en English
    • fr French
    • ha Hausa
    • ig Igbo
    • ru Russian
    • yo Yoruba

© 2023 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Apps
      • Gadgets and Appliances
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Podcast
  • TECHECONOMY TV

© 2023 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.