{"id":86351,"date":"2023-10-30T13:14:24","date_gmt":"2023-10-30T11:14:24","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=86351"},"modified":"2025-09-13T05:02:33","modified_gmt":"2025-09-13T02:02:33","slug":"bitrace-identifies-popular-methods-of-stealing-bitcoin","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/bitrace-identifies-popular-methods-of-stealing-bitcoin\/","title":{"rendered":"Bitrace identifies popular methods of stealing Bitcoin"},"content":{"rendered":"<p>Cybercriminals most often resort to three methods of stealing digital assets: fake applications, clipboard address spoofing, and liquidity fraud. This was reported by analysts <a href=\\\"https:\/\/mp.weixin.qq.com\/s\/NEmwSha1QsI_zuCwTQTLMw\\\">Bitrace<\/a>.<\/p>\n<p>In the case of fake crypto apps, hackers promote them in search results to outrank legitimate programs. They gain access to wallets via built-in backdoors.<\/p>\n<p>Fake apps, alongside individual malware in the transaction flow, can replace the recipient&#8217;s address copied to the clipboard with the attacker&#8217;s address.<\/p>\n<p>In the liquidity fraud scheme, victims are promised a stable income after funding the wallet with a certain amount. In reality, the malware embedded in the smart contract code grants the hacker permission to withdraw the user&#8217;s funds.<\/p>\n<p>Experts advised caution when investing in cryptocurrencies, and, in the event of theft, to use analytics tools to track the funds.<\/p>\n<p>Earlier, Bitrace found that over two years more than 3.4 billion USDT flowed into off-exchange wallets on the Tron network, of which <a href=\"https:\/\/u1f987.com\/en\/news\/experts-quantify-share-of-high-risk-usdt-operations-on-trons-otc-market\">54.2% are linked<\/a> to high-risk operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers most often resort to three methods of stealing digital assets: fake apps, clipboard address spoofing, and liquidity fraud.<\/p>\n","protected":false},"author":1,"featured_media":86352,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[44],"class_list":["post-86351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybercrime"],"aioseo_notices":[],"amp_enabled":true,"views":"21","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/86351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=86351"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/86351\/revisions"}],"predecessor-version":[{"id":86353,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/86351\/revisions\/86353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/86352"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=86351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=86351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=86351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}