{"id":38314,"date":"2022-10-25T12:44:44","date_gmt":"2022-10-25T16:44:44","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=38314"},"modified":"2022-10-25T12:44:47","modified_gmt":"2022-10-25T16:44:47","slug":"hackers-exploit-typing-mistakes-to-steal-cryptocurrency","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/hackers-exploit-typing-mistakes-to-steal-cryptocurrency\/","title":{"rendered":"Hackers Exploit Typing Mistakes to Steal Cryptocurrency"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Hackers used typos to infect Android phones and Windows PCs with malware. Hackers are <a href=\"https:\/\/www.google.com\/search?q=obtaining+personal+information+and+keys&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">obtaining personal information and keys<\/a> from unsuspecting consumers via typosquatting, or establishing names that are similar to those of real companies, according to a Cyble investigation.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"985\" height=\"547\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148.png\" alt=\"Hackers Exploit Typing Mistakes to Steal Cryptocurrency \" class=\"wp-image-38316\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148.png 985w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148-300x167.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148-768x426.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148-150x83.png 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148-750x416.png 750w\" sizes=\"(max-width: 985px) 100vw, 985px\" \/><figcaption>Hackers Exploit Typing Mistakes to Steal Cryptocurrency <\/figcaption><\/figure>\n\n\n\n<p>A group of hackers took advantage of typing mistakes to put malware on <a href=\"https:\/\/coinscreed.com\/staging\/top-10-crypto-wallets-for-beginners.html\" target=\"_blank\" rel=\"noreferrer noopener\">Android phones<\/a> and PCs running Windows. A report from Cyble says that hackers are using a method called &#8220;typosquatting,&#8221; which involves registering domains that are very close to those of official company brands, to get information and personal keys from customers who don't know what's going on.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-typing-an-internet-area-incorrectly-would-possibly-be-harmful-to-your-pockets\">Typing an Internet Area Incorrectly Would possibly Be Harmful to Your Pockets<\/h2>\n\n\n\n<p>Hackers have set up a web of <a href=\"http:\/\/malware-infected\" target=\"_blank\" rel=\"noreferrer noopener\">malware-infected<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> domains that take advantage of users' typos when they try to go to a certain website. According to a report from Cyble, a cyber security and digital threat assessment company, these domains look like well-known companies and apps, such as the Google Play Store, Apkure, and Apkcombo.<\/p>\n\n\n\n<p>Customers who go to the domains are told to download an infected version of the app they want, which can act as a way for the infection to spread. The target device, whether it's an Android phone or a Windows PC, will then be infected with a version of ERMAC, a malware trojan that gives the risk actors access to important personal information on the targeted device, such as <a href=\"https:\/\/coinscreed.com\/staging\/fireblocks-faces-legal-action-over-alleged-deletion-of-keys-to-72m-ether-wallet.html\" target=\"_blank\" rel=\"noreferrer noopener\">private keys<\/a>.<\/p>\n\n\n\n<p>The banking trojan was found for the first time in 2021. It now targets more than 460 functions and attackers can pay $5,000 a month to use it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hackers Concentrating on Extra Websites and Manufacturers Concerned<\/h2>\n\n\n\n<p>Even though the mentioned report only found evidence that a small group of apps and types were being faked, another security source did more research and found that at least 27 brands and app names are being attacked in this way. Tiktok is one of these apps.<\/p>\n\n\n\n<p>Apps like Notepad+ and the <a href=\"https:\/\/coinscreed.com\/staging\/coinbase-launches-web3-mobile-dapp-browser-and-defi-wallet.html\" target=\"_blank\" rel=\"noreferrer noopener\">Tor Browser<\/a> are much more geared toward developers than apps like Vidmate or Snapchat.<\/p>\n\n\n\n<p>On the list are also cryptocurrency wallets, cryptocurrency mining, and websites related to these things. Tronlink<\/p>\n\n\n\n<p>Metamask, Phantom, Cosmos Pockets, and Ethermine are all websites that are also being looked at. Each of these <a href=\"https:\/\/coinscreed.com\/staging\/crypto-mining-malware-infects-miners-on-112000-pcs.html\" target=\"_blank\" rel=\"noreferrer noopener\">fake domains<\/a> has different typo-squatted domains registered to make the attack as powerful and damaging as possible.<\/p>\n\n\n\n<p>Cybel gives different ways to avoid this kind of attack, like making sure your phone and computer are protected by a good antivirus and keeping an eye on your wallet and bank accounts often. But the best way to get to the websites of software and apps is to use a search engine and stay away from blog-posted instructions and links that are shown as part of <a href=\"https:\/\/coinscreed.com\/staging\/thailand-sec-to-impose-strict-guidelines-for-crypto-related-ads.html\" target=\"_blank\" rel=\"noreferrer noopener\">advertising campaigns<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers used typos to infect Android phones and Windows PCs with malware. Hackers are obtaining personal information and keys from unsuspecting consumers via typosquatting, or establishing names that are similar to those of real companies, according to a Cyble investigation. A group of hackers took advantage of typing mistakes to put malware on Android phones [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":38316,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[8647,132,937],"class_list":["post-38314","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-android","tag-crypto","tag-hackers"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/10\/image-148.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/38314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=38314"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/38314\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/38316"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=38314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=38314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=38314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}