• bitcoinBitcoin (BTC) $ 106,095.00
  • ethereumEthereum (ETH) $ 2,474.42
  • tetherTether (USDT) $ 1.00
  • xrpXRP (XRP) $ 2.33
  • bnbBNB (BNB) $ 645.98
  • solanaSolana (SOL) $ 166.26
  • usd-coinUSDC (USDC) $ 0.999820
  • dogecoinDogecoin (DOGE) $ 0.221074
  • cardanoCardano (ADA) $ 0.730791
  • tronTRON (TRX) $ 0.273869
  • staked-etherLido Staked Ether (STETH) $ 2,475.41
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 105,988.00
  • suiSui (SUI) $ 3.85
  • wrapped-stethWrapped stETH (WSTETH) $ 2,966.44
  • chainlinkChainlink (LINK) $ 15.40
  • avalanche-2Avalanche (AVAX) $ 22.02
  • stellarStellar (XLM) $ 0.283534
  • hyperliquidHyperliquid (HYPE) $ 25.72
  • shiba-inuShiba Inu (SHIB) $ 0.000014
  • hedera-hashgraphHedera (HBAR) $ 0.192243
  • leo-tokenLEO Token (LEO) $ 8.77
  • bitcoin-cashBitcoin Cash (BCH) $ 387.78
  • the-open-networkToncoin (TON) $ 3.05
  • litecoinLitecoin (LTC) $ 93.68
  • usdsUSDS (USDS) $ 0.999871
  • polkadotPolkadot (DOT) $ 4.58
  • wethWETH (WETH) $ 2,476.21
  • moneroMonero (XMR) $ 347.01
  • bitget-tokenBitget Token (BGB) $ 5.15
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 0.998955
  • wrapped-eethWrapped eETH (WEETH) $ 2,643.90
  • pepePepe (PEPE) $ 0.000013
  • pi-networkPi Network (PI) $ 0.731699
  • ethena-usdeEthena USDe (USDE) $ 1.00
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 106,226.00
  • whitebitWhiteBIT Coin (WBT) $ 30.23
  • aaveAave (AAVE) $ 257.48
  • daiDai (DAI) $ 0.999920
  • bittensorBittensor (TAO) $ 410.97
  • uniswapUniswap (UNI) $ 5.78
  • nearNEAR Protocol (NEAR) $ 2.71
  • aptosAptos (APT) $ 5.04
  • okbOKB (OKB) $ 51.92
  • jito-staked-solJito Staked SOL (JITOSOL) $ 200.68
  • ondo-financeOndo (ONDO) $ 0.933418
  • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
  • tokenize-xchangeTokenize Xchange (TKX) $ 36.15
  • crypto-com-chainCronos (CRO) $ 0.095435
  • kaspaKaspa (KAS) $ 0.107763
  • ethereum-classicEthereum Classic (ETC) $ 18.11
  • internet-computerInternet Computer (ICP) $ 5.14
  • official-trumpOfficial Trump (TRUMP) $ 13.32
  • gatechain-tokenGate (GT) $ 21.35
  • mantleMantle (MNT) $ 0.743350
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.17
  • susdssUSDS (SUSDS) $ 1.05
  • vechainVeChain (VET) $ 0.027713
  • render-tokenRender (RENDER) $ 4.55
  • usd1-wlfiUSD1 (USD1) $ 0.998986
  • cosmosCosmos Hub (ATOM) $ 4.71
  • ethenaEthena (ENA) $ 0.365698
  • lombard-staked-btcLombard Staked BTC (LBTC) $ 105,878.00
  • polygon-ecosystem-tokenPOL (ex-MATIC) (POL) $ 0.228986
  • fasttokenFasttoken (FTN) $ 4.40
  • fetch-aiArtificial Superintelligence Alliance (FET) $ 0.722831
  • algorandAlgorand (ALGO) $ 0.218856
  • arbitrumArbitrum (ARB) $ 0.384325
  • filecoinFilecoin (FIL) $ 2.79
  • celestiaCelestia (TIA) $ 2.60
  • worldcoin-wldWorldcoin (WLD) $ 1.08
  • jupiter-perpetuals-liquidity-provider-tokenJupiter Perpetuals Liquidity Provider Token (JLP) $ 4.52
  • sonic-3Sonic (prev. FTM) (S) $ 0.493980
  • first-digital-usdFirst Digital USD (FDUSD) $ 0.997134
  • bonkBonk (BONK) $ 0.000019
  • binance-peg-wethBinance-Peg WETH (WETH) $ 2,476.69
  • kucoin-sharesKuCoin (KCS) $ 11.78
  • jupiter-exchange-solanaJupiter (JUP) $ 0.494527
  • binance-staked-solBinance Staked SOL (BNSOL) $ 174.60
  • kelp-dao-restaked-ethKelp DAO Restaked ETH (RSETH) $ 2,563.38
  • blockstackStacks (STX) $ 0.847285
  • solv-btcSolv Protocol BTC (SOLVBTC) $ 106,049.00
  • nexoNEXO (NEXO) $ 1.27
  • story-2Story (IP) $ 4.48
  • fartcoinFartcoin (FARTCOIN) $ 1.26
  • virtual-protocolVirtuals Protocol (VIRTUAL) $ 1.90
  • flare-networksFlare (FLR) $ 0.018810
  • sei-networkSei (SEI) $ 0.220334
  • eosEOS (EOS) $ 0.770927
  • makerMaker (MKR) $ 1,701.25
  • immutable-xImmutable (IMX) $ 0.634266
  • usdt0USDT0 (USDT0) $ 0.999399
  • rocket-pool-ethRocket Pool ETH (RETH) $ 2,808.77
  • optimismOptimism (OP) $ 0.700631
  • injective-protocolInjective (INJ) $ 11.85
  • xdce-crowd-saleXDC Network (XDC) $ 0.072529
  • the-graphThe Graph (GRT) $ 0.107818
  • dogwifcoindogwifhat (WIF) $ 0.964807
  • curve-dao-tokenCurve DAO (CRV) $ 0.702209
  • flokiFLOKI (FLOKI) $ 0.000096
  • mantle-staked-etherMantle Staked Ether (METH) $ 2,639.12

How a Trust Wallet User Lost Funds Overnight: Uncovering the Risks of Malicious Approvals

0 0

How a Trust Wallet User Lost Funds Overnight: Uncovering the Risks of Malicious Approvals

Last week, a Trust Wallet user suffered a sudden overnight loss of his funds, as detailed in a recent report shared with BeInCrypto. When he contacted the wallet to find out what had happened, they informed him that he had unknowingly granted permissions to malicious websites or applications.

Eve Lam, Chief Information Security Officer at Trust Wallet, said in an interview with BeInCrypto that most unauthorized cryptocurrency withdrawals originate from user issues. Dmytro Yasmanovych, Head of Compliance at Hacken, shared this perspective and provided guidance on steps users should take if they suspect their cryptocurrency wallet has been compromised.

An Overnight Loss

Last week, Matias, a crypto user from Chile, went to sleep without a care in the world. By the time he woke up, however, that all changed. According to details shared with BeInCrypto, when Matias accessed his Trust Wallet, he saw that his funds had been withdrawn from his account.

A situation like this had never happened to him in his five years using his mobile wallet. Matias soon noticed that at 8 a.m., a small amount of crypto had been deposited in his account. Shortly after that, his account was emptied.

Matias had no idea how such a thing could happen. After contacting Trust Wallet’s security team for an explanation, he learned that the problem originated from something he had done inadvertently.

“Based‬‭ on‬‭ our‬‭ internal‬‭ data‬‭ and‬‭ incident‬‭ response‬‭ investigations,‬‭ the‬‭ vast‬‭ majority‬‭ of‬‭ unauthorized‬‭ withdrawals are traced back to user-side issues,” Lam told BeInCrypto.

She explained many ways users can accidentally share sensitive information with malicious actors.

The Reality of User-Side Vulnerabilities

Trust Wallet’s analysis of its internal data and incident response investigations indicates that user-side issues cause most unauthorized cryptocurrency withdrawals.

These frequently involve leaked or compromised seed phrases, often resulting from social engineering tactics, insecure storage, and malicious smart contract approvals granted by users.

Device-level compromises and other incidents, like SIM swap attacks or theft of unlocked devices, also contribute to these unauthorized withdrawals.

“In‬‭ all‬‭ these‬‭ cases,‬‭ the‬‭ Trust‬‭ Wallet‬‭ app‬‭ itself‬‭ is‬‭ not‬‭ breached—the‬‭ issue‬‭ stems‬‭ from‬‭ the‬‭ external‬‭ environment‬‭ in‬‭ which‬‭ it’s‬‭ being‬‭ used‬‭ or‬‭ from‬‭ actions‬‭ taken‬‭ prior‬‭ to‬‭ installation,” Lam detailed.

These exploitation methods are now among the most common attack techniques for stealing cryptocurrency from mobile wallets.

User Error vs. Wallet Hacks: Where Do Most Losses Occur?

While Hacken lacks specific internal data on evolving mobile wallet attack trends, Yasmanovych explained to BeInCrypto that fund losses enabled by user actions are increasingly evident in the cases the cybersecurity company investigates.

“What‬‭ we’re‬‭ seeing‬‭ in‬‭ our‬‭ investigations‬‭ and‬‭ tooling‬‭ points‬‭ to‬‭ a‬‭ much‬‭ broader‬‭ issue:‬‭ most‬‭ large‬‭ scale‬‭ losses‬‭ in‬‭ crypto‬‭ today‬‭ are‬‭ less‬‭ about‬‭ mobile‬‭ malware‬‭ and‬‭ more‬‭ about‬‭ failures‬‭ in‬‭ signer‬‭ workflows,‬‭ interface‬‭ security,‬‭ and‬‭ access‬‭ control,” ‭Yasmanovych outlined.

Signer workflows involve authorizing cryptocurrency transactions with private keys. If these keys are compromised, it enables direct, unauthorized transaction signing. Meanwhile, flawed user interfaces (UIs) in crypto wallets and dApps can mislead users into harmful transactions. Attack methods include address poisoning, where attackers create similar-looking addresses to intercept funds.

They also deploy spoofed or malicious dApps designed to steal credentials or induce harmful transaction signings. Additionally, UI redressing involves deceptive overlays that trick users into performing unintended actions.

Oftentimes, users also unknowingly authorize malicious smart contracts.

“‬That’s‬‭ an‬‭ important‬‭ point—malicious‬‭ approvals‬‭ can‬‭ exist‬‭ before‬‭ Trust‬‭ Wallet‬‭ is‬‭ ever‬‭ installed, especially‬‭ if‬‭ a‬‭ user‬‭ interacted‬‭ with‬‭ Web3‬‭ apps‬‭ using‬‭ other‬‭ wallets‬‭ or‬‭ browsers,” Lam warned.

Once such a scenario occurs, it’s extremely hard to recover funds.

The Challenge of Fund Recovery

Given its status as a non-custodial wallet, Trust Wallet cannot reverse crypto transactions after a scam. Nevertheless, it assists users by performing on-chain analysis to trace stolen funds. It also provides detailed incident reports for law enforcement and sometimes collaborates with forensic firms.

Despite these efforts, the likelihood of recovering funds remains very low.

“Success‬‭ depends‬‭ heavily‬‭ on‬‭ early‬‭ action.‬‭ When‬‭ funds‬‭ reach‬‭ CEXs‬‭ and‬‭ users‬‭ promptly‬‭ file‬‭ [law enforcement] reports,‬‭ there’s‬‭ a‬‭ non-zero‬‭ chance‬‭ of‬‭ asset‬‭ freezes.‬‭ Across‬‭ all‬‭ scam-related‬‭ cases,‬‭ the‬‭ recovery‭ success‬‭ rate‬‭ is‬‭ low‬‭, but‬‭ when‬‭ centralized‬‭ endpoints‬‭ are‬‭ involved‬‭ and‬‭ law‬‭ enforcement‬‭ is‬‭ engaged‭ quickly, we’ve seen funds recovered, like a case we assisted in with ~$400k traced,” Lam told BeInCrypto.

As a result, user education remains the most effective way to prevent the issues that cause these losses.

Beyond Detection: What Preventative and Reactive Steps Are Crucial?

Trust Wallet has a built-in Security Scanner that flags real-time threats such as interactions with known scammer addresses, phishing sites, and suspicious approvals. But sometimes, these warning signs aren’t enough.

To safeguard cryptocurrency wallets, Yasmanovych advised that organizations and individuals should implement Cryptocurrency Security Standard (CCSS) controls for managing keys and ensuring operational security.

“Define‬‭ clear‬‭ actions‬‭ for‬‭ when‬‭ a‬‭ key‬‭ is‬‭ suspected‬‭ compromised,‬‭ including‬‭ revocation,‬‭ fund‬‭ migration, and audit, require [Multi-factor authentication] for all access to wallet systems and key handling interfaces, use‬‭ quorum-based‬‭ access‬‭ to‬‭ prevent‬‭ any‬‭ single‬‭ actor‬‭ from‬‭ compromising funds, [and] implement‬‭ encrypted,‬‭ geo-distributed‬‭ backups‬‭ with‬‭ clearly‬‭ defined‬‭ restore‬‭ procedures‬‭ to‬‭ ensure resilience without centralizing risk,” he explained.

Yasmanovych also stressed the importance of knowing what to do after these exploits happen.

“If you suspect your cryptocurrency wallet has been compromised, act immediately:‬ Report‬‭ the‬‭ incident‬‭ to‬‭ law‬‭ enforcement‬‭ and‬‭ engage‬‭ crypto forensics professionals‭, track‬‭ stolen‬‭ funds‬‭ using‬‭ chain‬‭ analysis‬‭ tools‬‭ to‬‭ monitor‬‭ movement‬‭ and‬‭ identify‬‭ mixers‬‭ or‬‭ exchanges involved, [and] submit requests to exchanges with KYC data for frozen fund attempts,” he added.

Despite these measures, the reality remains that user-side vulnerabilities continue to lead to losses.

The Enduring Challenge of User Vulnerabilities in Mobile Wallets

Even with proactive security measures, the ongoing regularity of fund losses raises significant concern. The regularity of these events highlights the persistent challenge of user-end vulnerabilities when using mobile wallets.

The path to a safer Web3 inherently requires a balance between strong security protocols and proactive user preparedness. Consequently, a sustained commitment to user education and the widespread adoption of these protective measures remains vital for effectively reducing exploits and establishing a more secure environment across the industry.

Source

Leave A Reply

Your email address will not be published.