The cryptocurrency industry continues to be a prime objective for scammers and hackers who aim to find unsuspecting individuals. These perpetrators constantly adapt their strategies, using innovative and sophisticated approaches that make previous precautions ineffective.
In accordance with this pattern, recent reports have emerged regarding a fresh 'Wallet Drainer' exploit. This exploit utilized Google searches and ads on 𝕏 (previously Twitter) to effectively pilfer millions of dollars over a span of nine months. To date, it has affected over 60,000 victims.
Hackers Circumvent Security Measures of Google and X Systems
ScamSniffer, a well-known Web3 security platform, recently revealed on 𝕏 that a Wallet Drainer malware has been active for more than nine months, resulting in the theft of over $58 million from approximately 63,000 individuals.
The malware, initially identified in March, was attributed by ScamSniffer to numerous phishing campaigns and 𝕏 ads. It manifested in different variations, including the 'Ordinals Bubbles' form. According to the security company, the scammers utilized regional targeting and page-switching strategies to circumvent ad audits and complicate detection by Google and 𝕏. These tactics were employed to deceive the platforms and ensure their malicious ads went unnoticed.
ScamSniffer disclosed that more than 10,000 websites were linked to the same wallet drainer. The highest levels of activity were recorded in the months of May, June, and November.
With the growing complexity of scams, it is vital for users to take precautionary measures and maintain a high level of vigilance. This includes implementing necessary security measures and staying informed about the latest scamming tactics.
A trained eye can indeed help identify and filter out scammers, enhancing your safety against potential hacks. Here are some tips that can significantly improve your security:
- Look for inconsistencies. Most scams barely put any effort into their ads.
- If it’s too good to be true, it’s probably not true.
- Protect your recovery phrase by keeping it somewhere private.
- Double-check links, websites, and emails. Refrain from clicking any link unless it’s from a verified source. If the verified source has been compromised, take up the issue with other users and look for warnings and red flags.
- Verify and scan all addresses, such as contract, sender, and others, before doing anything permanent. -
- Report any suspicious activity to the concerned departments as soon as possible.
- Set up additional security layers, such as two-factor authentication.
- Always do your research.