Choose your country:

Cybercrime in the crypto space: how to protect your stash

Georgios by Georgios · March 28, 2023

I remember it like yesterday. A painful Friday afternoon, when I lost my hard earned 0.013489012899874163 BTC in less than thirty minutes to a scammer. See, I had anticipated the cash for something dear to me....

It all started when I signed into my crypto account― in an international crypto exchange platform for that matter― to convert my hard-earned coins into USD. As usual, I headed to the sell section of the platform and chose Paypal as my preferred withdrawal method ― I live in Chicago by the way. I then rolled over to the offers section, which was at that time swarmed by a variety of traders offering different exchange rates. On one hand, there were a few traders at the top offering an exchange of 1 USD for 2.03 USD of BTC as at that time ― it kept changing with the crypto market value. However, on a closer scrutiny all were verified. On the other hand, a dozen traders featured the bottom part of the list. Though unverified they offered a higher exchange rate for the same amount of Bitcoin― in this case 1 USD for 1.91 USD of BTC.

So, as fate would have it, I settled for the latter in the hopes of getting a higher return from my exchange. After a few message exchanges, a phone call and a sign-in into an unknowingly malicious link, all my crypto assets went to the wrong hands―And I was left high and dry. Lesson?

Cybercrime is real in the crypto world, especially when carrying out transactions, and it can affect you too. This incident sparked an interest in me to study cybersecurity. As of now, I’m not only certified in the space, but also well versed in its ins and outs.

So, in this post, I will talk about the emerging types of cyber-attacks targeting crypto account holders, how your account can be hacked during a transaction. And what you can do to avoid such scams. Hopefully, this information will help you keep your guard up and avoid being in a similar situation.

Let’s dig right in!

Emerging types of cyber-attacks targeting crypto holders

Stealer malware

Just as the name suggests, a stealer malware is a Trojan (type of computer virus) that collects user information from a computer system without their consent. It typically gathers a user’s vital and confidential information, such as their passwords, usernames and log in information for hacking purposes.

First, you’ll receive a message via email, messaging app or discord account encouraging you to take part in a specific activity to win some reward. For example, participate in beta testing particular software for monetary gains.

The bad news then usually happens when you fall for the bait and click on the provided links. The reason is that they harbor a self-executing compressed file (800M exe) that starts scanning your computer system for important keywords, such as “wallet” for hacking purposes.

Crypto drainer

In a similar vein, a crypto drainer or malware plays out by luring you to a fake crypto web page or ready to go crypto drainer phishing page employing similar tactics to those of a stealer malware, invisible video advertisements on Android devices for example. But this time around, you’ll get an advert on how to generate non-fungible tokens using legitimate third party apps and services, such as Metamask.

However, if you click on the provided links, things will go south, leading you to a phishing page that tears apart your crypto wallet and wipes away the existing balances.

"Crypto drainers are commonly deployed on phishing pages that imitate popular crypto services. Examples of the crypto services that a crypto drainer phishing page might imitate include cryptocurrency exchanges or non-fungible token (NFT) platforms." Report

Some of the recent cybercrimes played out by the stealer malware include the Mars Stealer, CthulhuWorldP2E,  idlemaster3d, and Yoyo Game Ltd attacks. Conversely, a perfect example of an infamous crypto drainer website is Pandaverse Mint. Stealer and drainer malware mostly target hot crypto wallet holders. They’re online based, making it pretty easy to glean critical information from them.

How can these two types of malware affect you as a crypto account or wallet holder?

Well, a stealer malware will basically worm into your stored computer system files to collect pieces of information that can help break into your crypto wallet or account. Then send it to hackers for reconstruction to enable entry into your stored digital assets.

DDoS extortion (V2C – victim-to-criminal) cyber-attack

Also known as Ransom DDoS (RDDoS), this cybercriminal activity involves a malicious actor or a criminal group threatening an individual or an organization to part with a given amount of money or crypto assets, or else face dire consequences, for example, a Distributed Denial of Service (DDoS) attack.

In most cases you’ll receive a threatening message about an impending attack on your services unless you surrender to the spelled-out demands. An excellent example of such is the Fancy Bear (APT 28) and Armada Collective (RDDoS) attacks that asked for a ransom of between 5 BTC and 30 BTC beforehand.

A key contributing factor to the rise of RDDoS attacks is the anonymous nature of crypto transactions. You’ll find it difficult to trace the perpetrators once ransom is paid. Not only that, an increase in value of particular crypto currencies, such as Bitcoin, among others has also attracted many, both with good and bad intentions.

“Inevitably, due to the nature of cryptocurrency — that it’s irreversible, anonymous and global — it’s obviously attractive to fraudsters.” Rich Drury, ombudsman manager at the FOS


It involves an act of a hacker transferring malicious code to a victim’s device for stealing purposes ― in this case, cryptocurrency assets. This type of attack follows a similar script to that of a stealer or drainer malware manifestation.

In summary:

  1. You’ll first receive a malicious link via email, downloaded apps or social media handles prompting you to complete a particular task to earn a reward.

  2. Your computer system then becomes infected with a crypto mining code that self-executes on the browser upon clicking on the link.

  3. This code then sends your crypto wallet’s details to a hacker’s server for reconstruction purposes. After which, your crypto wallet address becomes replaced by a fake one. This implies that, your future payments via “your crypto wallet” will be redirected to a hacker’s account.

Most non-custodial crypto wallets or hot wallets present prime targets to cryptojackers as they can be interchanged easily. An example of cryptojacking malware is the KryptoCibule virus, usually spread through pirated torrent files.

Note: cryptojacking malware will, in most cases, bog down your device, causing it to lag or operate slowly. Therefore, it’s critical to act with speed to prevent further loss or damage.

Cryptocurrency exchange attacks

They constitute cyber-attacks targeting cryptocurrency platforms, as well as individuals carrying out crypto transactions. Most of them target hot wallets owing to their online nature, vulnerability, and common use in crypto exchanges amongst individuals, and traders.

One way a hacker can gain access to your crypto wallet is by exploiting its private key vulnerabilities. Here, a malicious actor can use their graphics processing units (GPUs) to determine the seed phrase used to create your crypto wallet’s private key. And then develop a similar private key to yours for hacking purposes. A perfect example of such is profanity address hack in which millions of dollars were lost.

Another way of losing your crypto assets is initiating a trade process with a con artist purporting to be a genuine seller or buyer ― like in my case. You can be a victim of such, especially if you’re naïve or are not well-informed about the trending crypto cyber-attacks. In particular, I was new to crypto exchange platforms, so, wasn’t aware of the latest tricks in town used by con artists ― so I ended up losing my hard earned cash.

How my crypto wallet got hacked and how to prevent it

As mentioned before, selling or buying crypto assets in your favorite crypto exchange platform can turn ugly in a moment’s notice ― Courtesy of the ever increasing number of con artists. And it can be a nasty ordeal so to speak, if anything is to go by my experience.

In a nutshell, here is how it all went down with my faulty transaction

First, I logged into my Paxful account to exchange my earned BTC units into US dollars.

I then headed to the seller/ buyer section to initiate a selling transaction process.

As usual, I choose the preferred payment option. I went for Paypal as it was the most convenient method for me at the moment.

I then proceeded to the corresponding trading page featuring two types of traders: the verified and the unverified ones. For instance, take a look at the following images for better understanding:

Verified traders

Unverified traders

In my case, I chose a trader from the latter group (unverified traders) as they had advertised a higher exchange rate compared to others.

  1. So I initiated the trade; and that’s where trouble started.

In short, I first keyed in the amount of BTC to sell as usual. I then provided my trading details as it is the norm, my email address in this case. However, things started taking a different turn this time round as I was supposed to get an equivalent amount of USD to the keyed in BTC units in my Paypal account, which wasn’t the case. In fact, the back and forth games with the trader started at this point.

Here is what happened. They initially texted-in to advise that I login to a provided shopify link address in order to access my money as they had sent it there. However, this activity didn’t bear any fruit. The trader then followed up with a falsified customer care message of my crypto exchange platform to my email address to coax me to change my login details to address the problem. Little did I know that things were getting thick; efforts to crack into my account had started. They then communicated back to inform me that I should remove 2FA to allow customer care to resolve the issue now. And that’s how it all went down. The hacker was able to access my account, and within a few minutes, all my crypto assets transferred to another wallet.

Common ways of losing your coins

Having said that, let’s now look at some of the other ways you can lose your crypto assets to cybercriminals ― to avoid my kind of experience:

Not vetting your crypto exchange partner or trader

It constitutes the number one “sin” you can commit as a crypto wallet holder or trader on any cryptocurrency trading platform ― whether legit or not. This is because a majority of the current crypto sites have become a haven for con artists owing to the lucrative nature of crypto transactions.

In most cases these shady vendors will flaunt higher exchange rates compared to genuine traders to entice you ― as in my case.

Luckily, it is pretty easy to pin point them. You can do so by checking your trading partner’s verification status beforehand. A trader that isn’t verified is a red flag; trade with them carefully if you decide to do so. Otherwise, as a rule of thumb, just go for a verified trader to allow a smooth and successful exchange process.

Not activating 2 factor authentication (2FA)  

According to CNBC, crypto hackers are getting smarter by the day, so, having a password as the only gatekeeper for your account can turn disastrous ― a move here and there by a hacker can hand them your account. And this explains my advocacy for 2FA.  Enabling it on your crypto account prevents easy access.

For instance, you’ll be required to key in a one-time password sent via email or phone by your crypto exchange platform to gain entry into your crypto account and wallet. That is after inputting your password. So, any Tom, Dick and Harry having your crypto account password without the one-time password wouldn’t proceed anywhere after the initial stage of getting into your account.

To tighten up security, it’s advisable to activate 2FA for all your activities on the account. For instance, when logging in, and before conducting any transaction to prevent most of the blockchain cybersecurity risks.

On-boarding a rogue crypto exchange

Without question, the rise in crypto currency value and transactional profits has led to the mushrooming of crypto exchange platforms. Unfortunately, some of them are fake sites operating in the guise of genuine ones. Signing up on such sites can lead to the loss of your crypto assets or portfolio.

That’s why, it’s super important to determine the authenticity and safety of your go-to crypto exchange platform before making any transactions. You can do so by checking out their legitimacy and customer opinions on review sites, such as Trustpilot and G2. Additionally, ensure that the platform has proper security measures in place. Alternatively, you can sign up with any of the following best crypto exchanges.

Putting all your eggs in one basket

Storing all your crypto assets in a single platform is not advisable. You never know what might happen; the site could be hacked, as was the case with FTX. Or you could lose all your assets in a single faulty transaction.  And you do not want to end up in court or chasing individuals for your money. 

One way to wrap around this is to keep your digital currency in more than one account. Even better, purchase several hardware wallets for storing part of your portfolio or all of it.  

How to protect yourself from potential cyber-attacks

As the saying goes, “prevention is better than cure.” implementing appropriate measures to ward off potential or emerging cyber-attacks can ensure the safety of your crypto assets.

Here are some ways you can use to prevent the afore-mentioned cyber threats: stealer malware ands drainer malware

How to protect your account from stealer malware

  • Use Two-Factor Authentication: One primary way of preventing stealer malware is by activating two-factor authentication (2FA) on your crypto accounts. In this case, setting up your normal login password ― which should be a strong one ― in addition to enabling 2FA on your crypto exchange platform’s dashboard. Having two-factor authentication in place makes it difficult for a cybercriminal to access your digital assets even if they have your login credentials.

  • Use of a dedicated password manager: If you find it difficult to memorize complicated passwords for your different user accounts, a password manager can be a helpful tool. It allows you to save unique passwords in an encrypted database eliminating the need to jot down or cram your password.

    With a password manager, you can be assured that your passwords will not be easily accessed. It can also automatically sign you into platforms for convenience and help you identify fake websites that may lead you into danger. A password manager can also alert you when you’re using the same passwords for different accounts giving you the opportunity to make changes to keep them secure.

    Overall, using a dedicated password manager can help keep different types of viruses at bay, including the redline stealer malware. Examples of the best password managers you can use in 2023 include 1Password, Bitwarden and Dashlane.

  • Continuously update your cybersecurity software: To keep up with the ever evolving stealer malware variants it’s important to consistently update your antivirus protection software. This helps fix any security gaps that may arise and ensures that your system and stored accounts are safe and sound. You can manually update your antivirus program or set it to automatic update mode. Alternatively, you can subscribe to a reliable endpoint solution provider who can manage your updates automatically and take care of all your other needs.

How to protect your account from drainer malware

Visiting suspicious crypto websites or clicking on suspicious links is one sure way of activating the drainer malware and putting your crypto wallet at risk. So, as a rule of thumb, avoid them by all means, however enticing the rewards might be.

In general, keeping cryptocurrency cyber-attacks such as the stealer and drainer malware at bay, requires you to activate the necessary preventive measures from the word go. Having an effective cybersecurity plan or end point solution in place at all times pre-empts such kinds of malware from infiltrating your system.

DDoS extortion (V2C – victim-to-criminal)

You can prevent this type of cybercriminal activity using two main methods. The first is to install IP protection for small-scale denial-of-service attacks. Protecting your IP by specifying where traffic should come from denies a possible DDoS attack from unwanted quarters. This cuts off cybercriminals intending to flood your system with unwanted details for ransom purposes. To maximize this method, you can extend DDoS protection to all your available IP addresses, internet-facing infrastructure, web services, and DNS servers. This can help seal all the loopholes available to DDoS threat vectors.

Next is collaborating with your Internet Service Provider (ISP) to help prevent the interruption of internet services by any of the attackers. Additionally, provide you with helpful information that can be used by law enforcement authorities in case of an attack.  

On the contrary, you can opt for a cloud-based protection service in case of large attacks. In most cases they have all the required resources to counter heavy attacks. For example, they integrate multi-cloud deployment software that takes care of attacks from hybrid cloud deployments and different cloud environments. Plus secondary asset protection software which ensures that all your network’s vital components, such as FTP servers, email servers, APIs and DNS servers are well catered for.

As usual, it’s advisable to install these prevent measures as early as possible to preventive an attack from extortionists wanting a share of your sweat.


Keeping cryptojackers at bay is also super important for your digital assets. Some of the preventive measures include installing effective and up-to-date antivirus software or cybersecurity program. This helps prevent malware from gaining entry into your system. Some of the popular and safe anti-virus programs in the market you can try out include Avira, Mcfee, and Bitdefender.

Besides that, it’s also vital to watch out for the latest cryptojacking trends to help keep up your guard to avoid becoming a cyber-attack victim. This means staying alert on what is going on in the crypto space by reading top blogs, following influencers and keeping tabs on current crypto news.

Another way of slaying the cryptojacking menace is by the use of browser extensions such as minerBlock designed to block out cryptojacking attempts. You can use ad blockers as well, to get rid of those annoying pop-ups and potential malware traffic.

Disabling Javascript on your browser also comes through as a preventive measure; though at a certain degree of inconvenience. For instance, it can cause the breakage of some web pages causing a navigation problem.

Finally, make it a habit not to visit suspicious websites; you can even go a step further by blocking them. My opinion is to visit secured sites for any online transactions: one having an https at the beginning of the URL and not http.

All in all, cryptojacking detection, and prevention using crypto cyber security tools can help safeguard your crypto investments. This makes it important to put in place the necessary preventive measures prior to opening up any crypto account. Besides, conducting cryptojacking detection exercises on a regular basis.

Cryptocurrency exchange attacks

Finally, you can keep your crypto account or wallet safe from fraudsters by doing the following. First off, is by signing into a crypto exchange platform that has a cold storage feature. This way, your crypto wallet will be stored on an offline mode when not in use, making it less vulnerable to cyber-attacks compared to hot wallets.

The next thing to consider is getting your crypto wallet from a reputable developer who weaves in modern security features on their product. For example, a wallet that doesn’t leave any loopholes in its private keys, supports two-factor authentication and one that automatically logs out after a particular period of inactivity. Examples of top crypto wallets you can use include the Coinbase wallet, Ledger and ZenGo.

Lastly, you need to vet the person you’re going to trade with. Are they verified? Do they have positive reviews from previous transactions? Doing so reduces the risk of being conned by the ever-increasing con artists, of which there are many on the current crypto exchange platforms.

What to look out for in a safe crypto exchange

When selecting your go-to crypto exchange platform, it’s crucial to look out for the following features to ensure the safety of your crypto assets, both in storage and in exchanges:


This is the number one thing to consider. After all, the platform will be the custodian of your crypto assets, so any security lapse can negatively affect your investments. Check if the site supports two-factor authentication for verification purposes, has a whitelisting feature to highlight the approved participants. And, has a cold storage feature to allow the storage of crypto wallets in an offline mode to prevent hackers from accessing them.


Also, check if the platform is insured in case it gets hacked. An insured site can at least give you assurance that you’ll recover your funds if something bad happens. The reputation of the platform is also important. An excellent choice is one that has a commendable number of positive reviews from happy customers. On the other hand, a site with numerous bad or poor reviews from clients should raise your eyebrows.


Another thing to look at is the history of the platform you are considering to join. Has it been hacked before? What was the cause and what happened thereafter? Plus, who owns the company? Are they transparent about it? Having answers to such questions can guide you on the next course of action.

Regulatory compliance

Regulatory compliance is yet another worthwhile thing to consider. A well-set cryptocurrency exchange platform needs to have passed the anti-money laundering and know-your-customer checks.  This helps keep cryptocurrency privacy issues in check, and the dangers of cryptocurrency cyber-attacks out of the window.


You should also check the liquidity of your preferred site. Does it have enough cash at hand or in circulation to attract more traders and account holders?  A site that doesn’t have enough money or digital assets in circulation can lead to trader or customer apathy. As a result, it can go out of business, which is something you don’t want to happen with your digital assets at stake.  

Customer support

The level of customer support provided by a platform is also an indication of how safe your investment is. A suitable crypto exchange site should have its customer care service available 24/7 for convenient use. For example, it should allow you to make a complaint or ask a question at any time of the day followed by a quick reply to seek out the issue at hand. In other cases, it should enable you to make timely transactions since crypto prices do change drastically over a short period. A delay in settling your issue can drastically affect your financial possibilities.

Trading methods

Last but not least, take a look at the trading methods used by the platform to determine how safe your transactions can be. Do they transact via ATM, phone, web or apps? Or do they use multiple avenues to transact business? A site with various trading options allows you to choose the most suitable and secure options according to your needs.

Key takeaways

  1. Bitcoin theft has become rampant. Therefore, you need to be on constant alert if you’re a crypto wallet or account holder.

  2. There is a need for installing appropriate preventive measures to combat Bitcoin crime, amongst other cryptocurrency cybercrimes. Such measures include subscribing to reputable cybersecurity programs, installing effective antivirus software, and constantly updating them.

  3. Crypto Crime is becoming more sophisticated by the day. Cybercriminals are now using advanced hacking programs such as the Red Malware ― bought at a fee ― to access a person's crypto account and wallet. So be very careful when visiting suspicious crypto pages, if not at all.

  4. It is important to vet a cryptocurrency exchange platform before signing up. This is because there is a rise in rogue crypto sites whose main aim is to defraud subscribers. It is also advisable to check your go-to platform’s security features as they would determine the safety of your digital assets.

  5. You can use a variety of methods to protect your crypto account or wallet from cybercriminals. For instance, subscribing to a competent cybersecurity program provider, or installing the required anti-virus program or malware software, among other things.


What is the main threat experienced by crypto platforms?

A majority of crypto platform owners fear well-coordinated and advanced attacks from sophisticated hackers. By the time of writing this piece more than nineteen Crypto sites have been hacked into and colossal sums of digital assets stolen.

How do I protect my crypto wallet?

You can implement the following methods to protect your crypto wallet:

  • Use of two-factor authentication and strong passwords. You can also encrypt your passwords for added security.

  • Subscribing to an effective cybersecurity program or installing efficient antivirus software to prevent your system from being infected by malicious software.

  • Joining a crypto exchange platform that offers cold storage for crypto wallets.

  • Being careful on how and where to purchase your cryptocurrency assets.

  • Backing up your crypto wallet by storing the recovery phrase on your notepad, safes or lock boxes.

  • Use of facial or biometric recognition systems to allow access into your crypto wallet.

  • Staying on the watch out for phishing and scamming attempts. In this case do not click on suspicious links or visit odd looking crypto pages.

  • Creating a multisignature wallet

Why are cyber-attacks increasing on cryptocurrency exchange platforms?

Several reasons inform the current upsurge in cyber crypto crimes. First is the increase and sophistication of ransomware and hacking gangs. Next is the availability of advanced hacking tools and software at a price which encourages criminal activities. Finally, is the increase in use of cryptocurrencies between individuals and amongst institutions presenting an avenue for exploitation by criminals.

Is it possible to hack a crypto wallet?

Yes, in fact each sunrise is a field day for sophisticated cybercriminals. They employ all the tricks at their disposal to get access into their victim’s crypto wallet. Some have even resorted to purchasing hacking malware for use. For instance the redline stealer malware that goes for around $100 on the dark web.

What is the safest way to buy and sell crypto?

There is no full proof method for a secure crypto transaction. Each way has its own loopholes that can be taken advantage of by cybercriminals. So practice utmost care in whatever method you use to buy or sell your crypto assets.

What are crypto related cyber attacks?

They constitute cybercriminal activities aimed at those interested in mobile banking and cryptocurrency. In this case, a fraudster poses a legit investment portfolio or service to unsuspecting crypto owners and then vanishes with their cash.

How difficult is it to hack a crypto wallet?

This depends on the crypto fraud preventive measures put in place. Some can be a hard nut to crack, while some can be a breeze to bypass. As an example, the use of multi-authentication on a crypto wallet can present a steep hurdle to hackers compared to a single login requirement.

Therefore, it is super important as a crypto wallet owner to implement all the cybercrime preventive measures on your computer system and crypto account to keep hackers at bay.

What are the cybersecurity risks of cryptocurrency?

As a digital coin owner, you’ll face a number of cybersecurity risks. They include phishing attempts and malware attacks from cyber criminals intending to empty your crypto wallet as in the case of crypto drainers, and crypto hacking.

What are the 10 most common tactics of cyber attacks?

They include insider threats, supply chain attacks, code injection attacks, identity-based attacks, spoofing, phishing, denial of service attacks and malware.

Back to Top