theft

Security companies: There has been a significant increase in password theft attacks targeting encrypted wallets, especially against Apple macOS users

ChainCatcher news, according to Forbes, security company ESET has just released its latest threat report, which examines the threat landscape trends from June to November 2024. The number of password theft attacks targeting cryptocurrency wallets has increased, with the most significant rise occurring among macOS users.The report states: "According to ESET's telemetry data for the second half of 2024, the number of password-stealing software across multiple platforms (especially Windows, macOS, and Android) has increased," but compared to the first half of the year, the detection of password-stealing software targeting cryptocurrency wallets on macOS has more than doubled. Meanwhile, the number of password-stealing software on the Windows platform grew by 56%, while financial threats on the Android platform, including password-stealing malware, increased by 20%.ESET's analysis shows that the number of password-stealing software targeting the macOS platform (especially those related to cryptocurrency wallet credentials) surged by 127%. Security researchers noted: "Although these threats cannot be simply classified as password-stealing software just because they have broader functionalities, they do reveal a significant upward trend in password theft activities on the macOS platform." From a geographical perspective, ESET's analysis indicates that attacks on Bitcoin and other cryptocurrencies targeting macOS are mostly aimed at the United States, followed by Italy, China, Spain, and Japan.

People's Court Daily: The act of stealing virtual currency constitutes the crime of theft and the crime of illegally obtaining data from computer systems

ChainCatcher news, the Civil Court Daily published an article titled "Criminal Qualification of Illegal Theft of Virtual Currency," which points out that the act of stealing virtual currency constitutes theft. As an economic property, it must have value, including utility, scarcity, and disposability. Scarcity is reflected in the constant total supply of virtual currency, which is not infinitely available. Disposability is demonstrated by the use of asymmetric encryption technology for virtual currency, which exists in wallets (i.e., addresses), and once the address and private key are obtained, one can control the virtual currency. Utility is reflected in the fact that virtual currency, as a specific data encoding, must be generated through "mining," which condenses social abstract labor.The article also points out that the act of stealing virtual currency constitutes the crime of illegally obtaining data from computer systems, as virtual currency has data characteristics. The illegal theft of virtual currency constitutes the crime of illegally obtaining data from computer systems. Regarding the determination of the amount of stolen virtual currency, it is more reasonable to set the amount of virtual currency involved in the case at the time the defendant committed the crime rather than when the victim purchased the virtual currency.

The Singapore government reminds citizens to be vigilant against cryptocurrency theft incidents

ChainCatcher news, according to 8world, the Singapore Police Force and the Cyber Security Agency issued a joint statement indicating that recently, criminals have been observed using various methods to steal cryptocurrency from victims' wallets. Their common tactics include:Impersonating legitimate entities on social media, using giveaways or promotional activities as bait, and asking victims to "verify" their wallets by sharing login credentials and other personal information.Criminals may also impersonate the owners of cryptocurrency companies, sending malicious links under the pretext of assessing the victims' capabilities in the blockchain field. Once clicked, these links automatically transfer cryptocurrency from the victims' wallets.Additionally, criminals may exploit phishing websites, software vulnerabilities, smart contracts, etc., to invade victims' wallets and steal cryptocurrency.Singapore government agencies urge the public to take preventive measures to protect their wallets, such as: using hardware wallets and other secure offline storage devices; employing strong passwords and two-factor authentication; and regularly checking accounts.If you suspect that you have become a victim, you should immediately contact the cryptocurrency exchange to stop trading or freeze your account if possible; check and revoke any suspicious token authorizations; promptly transfer any remaining cryptocurrency from the affected wallet to another wallet; and report to the relevant authorities.
ChainCatcher Building the Web3 world with innovators