🏠
dev-angelist
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 🏠Home
  • 📒Certification Notes
    • Certified Ethical Hacker (CEH) Practical
    • CRTP
    • eWPTXv3
    • eCPPTv3
    • eWPTv2
    • eJPTv2
  • ✍️WRITEUPS & WALKTHROUGHS
    • TryHackMe (THM)
    • HackTheBox (HTB)
    • VulnHub
    • DockerLabs.es
    • PortSwigger - Web Sec Academy
    • HomeMade Labs
  • 🕸️WEB
    • eWPTXv3
    • eWPTv2
    • WAPT
    • DVWA
    • Secure Bank
    • Mutillidae II
    • WebSafeHub (WSH)
    • PortSwigger - Web Sec Academy
  • Common Services Pentest
    • Web Services - 80/443/8080
      • Tomcat
        • Lab Setup & Configuration
        • Enumeration
        • Exploitation
        • Mitigation & Hardening
    • SMB - 139/445
  • 👩‍💻CODING
    • 🐍Python
      • Python Offensive
      • Email Header Analyzer
      • Dir-Brute
      • Port-Scanner
      • Finger User Enumeration
    • DevSecOps
    • 🔹Powershell
  • 🔴Offensive Security
    • Active Directory (AD)
      • CRTP
      • AD HomeMade Lab
  • Privilege Escalation
    • Windows Privilege Escalation
  • 🔐Crypto & AI/ML
    • Crypto & Blockchain
      • Blockchain Security
        • Blockchain Architecture
          • 1.1 Characteristics and Features
          • 1.2 Core Components
          • 1.3 Consensus Algorithm
          • 1.4 Cryptography
          • 1.5 Cryptocurrency
        • Front-end Risks
          • 2.1 MFA and Blockchain
          • 2.2 Front-end
          • 2.3 OWASP Modeling for Blockchain
          • 2.4 Wallet Attacks
          • 2.5 Client Vulnerabilities
        • Back-end Risks
          • 3.1 Consensus Vulnerabilities
          • 3.2 Mining Pool Vulnerabilities
          • 3.3 Network Vulnerabilities
            • 3.3.1 DoS/DDoS/BDoS Attacks
            • 3.3.2 Delay Attacks
            • 3.3.3 Partition Attacks
            • 3.3.4 Sybil Attacks
            • 3.3.5 Time Jacking
            • 3.3.6 Transaction Attacks
        • Mining-Risks
          • 4.1 Mining Overview
          • 4.2 Proof of Stake Post Merge Ethereum
          • 4.3 Crypto Mining Malware (Cryptojacking)
          • 4.4 Zero Trust Models
          • 4.5 Byzantine Fault Tolerance
        • Blockchain as a Service
    • AI/ML Pentest
  • ACTIVE DIRECTORY
    • AD Enumeration
  • Guides & Articles
    • My Articles
    • Guides & Tutorials
      • Burp Suite - Configuration
      • Quickemu - VM
      • Setting Up SSH Keys
      • Building an AD Lab
      • Work Guidelines
  • Windows
    • Windows Enumeration
    • Windows Privilege Escalation
  • INTELLIGENCE GATHERING
    • OSINT
  • LINUX (tbd)
    • Linux Enumeration
    • Linux Privilege Escalation
Powered by GitBook
On this page
  • Wallet Attacks
  • Common Types of Wallet Attacks:
  • Prevention & Mitigation of Wallet Attacks:
  1. Crypto & AI/ML
  2. Crypto & Blockchain
  3. Blockchain Security
  4. Front-end Risks

2.4 Wallet Attacks

Wallet Attacks

Wallet attacks refer to various types of security breaches or exploits that target cryptocurrency wallets, which are used to store and manage cryptocurrencies like Bitcoin, Ethereum, and others. These attacks can involve the compromise of private keys, vulnerabilities in wallet software, or social engineering techniques.

Common Types of Wallet Attacks:

  1. Private Key Theft

    • Private key theft is one of the most critical threats to cryptocurrency wallets. The private key is what gives the owner control over their funds, and if stolen, attackers can access and steal funds from the wallet.

    • Methods:

      • Phishing: Scammers impersonate legitimate services to trick users into revealing their private keys or recovery phrases.

      • Malware: Malware can be installed on a user’s device to steal private keys, passwords, or recovery phrases stored locally.

      • Keylogging: Malicious software that records keystrokes can capture sensitive wallet credentials.

  2. Phishing Attacks

    • Phishing attacks are when attackers impersonate a legitimate website or service (e.g., a wallet provider) to trick users into entering their private information, such as passwords or recovery phrases.

    • Attackers often send fake links through email, social media, or messages, hoping users will click on them and enter their sensitive information.

  3. Man-in-the-Middle (MITM) Attacks

    • In a MITM attack, attackers intercept communications between the user and a wallet service. This can allow them to steal sensitive data, like private keys or recovery phrases, during the communication process.

    • This is especially risky when users connect to wallet services over unsecured networks (e.g., public Wi-Fi).

  4. SIM Swapping

    • SIM swapping occurs when attackers gain control over a victim’s phone number by tricking the phone carrier into transferring the victim's phone number to a new SIM card. This can be used to bypass SMS-based 2FA (two-factor authentication) and access wallet accounts.

    • Attackers may then access wallets or exchange accounts that are protected by SMS-based authentication.

  5. Cold Wallet Theft (Physical Attacks)

    • Cold wallets, such as hardware wallets (e.g., Ledger, Trezor), are considered one of the most secure ways to store cryptocurrencies because they are not connected to the internet. However, they can still be stolen through physical theft.

    • Attackers can gain access to the private keys by physically stealing the hardware wallet, especially if it is not securely backed up or protected by a PIN.

  6. Smart Contract Vulnerabilities

    • Smart contracts are used in many crypto wallets to enable decentralized applications (dApps) and transactions. Vulnerabilities in smart contract code can be exploited by attackers to steal funds from wallets.

    • Reentrancy attacks and gas limit vulnerabilities are common issues in smart contract code that can be exploited in wallet applications.

  7. Wallet Cloning & Fake Wallets

    • Wallet cloning occurs when attackers create fake wallet apps that look identical to legitimate wallet applications. Users who download these apps may unknowingly expose their private keys to attackers.

    • Fake wallets can steal funds as soon as users enter their private key or recovery phrase.

  8. Social Engineering

    • Social engineering involves manipulating individuals to gain access to sensitive information. Attackers might pose as customer support agents, fellow users, or even friends to trick the target into revealing their wallet credentials.

    • Examples include calling the user and pretending to be from the wallet provider to get the victim’s recovery phrase.


Prevention & Mitigation of Wallet Attacks:

  • Use Multi-Factor Authentication (MFA): Always enable MFA for any wallet or exchange account to add an extra layer of protection.

  • Cold Storage: Store cryptocurrencies in cold wallets (offline storage) to protect them from online threats. Hardware wallets are recommended for long-term storage.

  • Strong Passwords & Encryption: Use strong, unique passwords for your wallet accounts, and ensure that sensitive data (e.g., recovery phrases) is encrypted or stored securely.

  • Backup: Make secure backups of your private keys or recovery phrases. Never store them in insecure locations like on your computer or online.

  • Educate Users: Be aware of phishing scams, malicious websites, and social engineering tactics to avoid falling victim to wallet attacks.

Previous2.3 OWASP Modeling for BlockchainNext2.5 Client Vulnerabilities

Last updated 6 months ago

🔐