SlideShare a Scribd company logo
1 of 8
About Us
iZOOlogic is an internet company dedicated to providing niche brand protection
and phishing solutions.
iZOOlogic Provides Fraud Prevention, Anti-Phishing Solutions, Malware
Protection & Brand Protection Solutions to protect electronic channels
from cybercrime.
www.izoologic.com
MEWKit Drains ETH Wallet – Crypto Phishing Attack?
www.izoologic.com
Must Know About
We have to be aware on how our private information and security is being
handled.
Crypto currency exchanges are no exception, because malicious attacks such as
phishing and its kind exists, and has already found a way to exploit the
technology.
Aside from technology being exploited, the general public is also a key aspect for
attackers to gain success.
Crypto Phishing Attack
www.izoologic.com
Phishing Attacks used by cyber-criminals to steal crypto-currencies
www.izoologic.com
www.izoologic.com
Lately the boom of Cryptocurrency has attracted all sort of people belonging to different profiles in
life. Cybercriminals who uses social engineer is well aware of that and will always be actively finding
ways to take advantage of this.
Lately a criminal group took advantage and is currently taking advantage of the crypto currency
boom specifically on people’s Ethereum wallets and then steal the contents which a kit was
developed to fulfill their modus.
The kit is called MEWKit which was discovered by the researchers of RiskIQ. The kit copy’s the
MyEtherWallet webpage in order to steal credentials from unsuspecting victims, and at the same
time deploys a script to automate an ethereum wallet transfer to process the information stolen by
the phishing site and transfer funds. The process here can be real time, the Ethereum wallet of
victims can be stolen the moment right after they willingly enter their credentials to the copycat
page of MyEtherWallet.
www.izoologic.com
Crypto Phishing Attack
www.izoologic.com
The script would make it look like it creates a fund transfer by executing the commands like a
real user would, all while the procedure remains in stealth. Security researchers point out that it
is the first time an attack has been seen to use this automated tactic.
MEWKit has the feature to allow the phishing authors to survey how much Ethereum has been
collected, as well as storing a record of private user keys and passwords which can be used for
further attacks.
With this new-type of phishing modus which focuses on both traditional and new generation
phishing attacks, the best way to avoid being a victim is to ensure that the MyEtherWallet
website is opened on the browser and not through click-through URLs. Always be careful when
using online facilities, stay vigilant and pro-actively open sites via the browser URL itself.
Crypto Phishing Attack
Contact Us
14 Hanover Street, W1S 1YH City of Westminster, London
UNITED KINGDOM
+44 20 3734 2726
info@izoologic.com
www.izoologic.com

More Related Content

Similar to Crypto phishing attack

Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsMaxim Kozlovsky
 
Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Manny Fernandez
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsSejahtera Affif
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsSejahtera Affif
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes teamABIN VARGHESE
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
what is a role of ethical hacking.pptx
what is a role of ethical hacking.pptxwhat is a role of ethical hacking.pptx
what is a role of ethical hacking.pptxNarangYadav
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
 
The Importance of Cyber Security in Cryptocurrency
The Importance of Cyber Security in CryptocurrencyThe Importance of Cyber Security in Cryptocurrency
The Importance of Cyber Security in CryptocurrencyNiall O'Riordan
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Money 2Conf
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto ScamsMike Bike
 
Thouhgts on the future of information technology (IT) software secur.pdf
Thouhgts on the future of information technology (IT) software secur.pdfThouhgts on the future of information technology (IT) software secur.pdf
Thouhgts on the future of information technology (IT) software secur.pdfaminbijal86
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfTime Speed Magazine
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 

Similar to Crypto phishing attack (20)

Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide Cryptocurrency -A beginner's guide
Cryptocurrency -A beginner's guide
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
what is a role of ethical hacking.pptx
what is a role of ethical hacking.pptxwhat is a role of ethical hacking.pptx
what is a role of ethical hacking.pptx
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
The Importance of Cyber Security in Cryptocurrency
The Importance of Cyber Security in CryptocurrencyThe Importance of Cyber Security in Cryptocurrency
The Importance of Cyber Security in Cryptocurrency
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Thouhgts on the future of information technology (IT) software secur.pdf
Thouhgts on the future of information technology (IT) software secur.pdfThouhgts on the future of information technology (IT) software secur.pdf
Thouhgts on the future of information technology (IT) software secur.pdf
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdfCloning Attack-Unveiling the Stealthy Threat.pdf
Cloning Attack-Unveiling the Stealthy Threat.pdf
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsShree Krishna Exports
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Recently uploaded (20)

Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Crypto phishing attack

  • 1. About Us iZOOlogic is an internet company dedicated to providing niche brand protection and phishing solutions. iZOOlogic Provides Fraud Prevention, Anti-Phishing Solutions, Malware Protection & Brand Protection Solutions to protect electronic channels from cybercrime. www.izoologic.com
  • 2. MEWKit Drains ETH Wallet – Crypto Phishing Attack? www.izoologic.com Must Know About
  • 3. We have to be aware on how our private information and security is being handled. Crypto currency exchanges are no exception, because malicious attacks such as phishing and its kind exists, and has already found a way to exploit the technology. Aside from technology being exploited, the general public is also a key aspect for attackers to gain success. Crypto Phishing Attack www.izoologic.com
  • 4. Phishing Attacks used by cyber-criminals to steal crypto-currencies
  • 6. www.izoologic.com Lately the boom of Cryptocurrency has attracted all sort of people belonging to different profiles in life. Cybercriminals who uses social engineer is well aware of that and will always be actively finding ways to take advantage of this. Lately a criminal group took advantage and is currently taking advantage of the crypto currency boom specifically on people’s Ethereum wallets and then steal the contents which a kit was developed to fulfill their modus. The kit is called MEWKit which was discovered by the researchers of RiskIQ. The kit copy’s the MyEtherWallet webpage in order to steal credentials from unsuspecting victims, and at the same time deploys a script to automate an ethereum wallet transfer to process the information stolen by the phishing site and transfer funds. The process here can be real time, the Ethereum wallet of victims can be stolen the moment right after they willingly enter their credentials to the copycat page of MyEtherWallet. www.izoologic.com Crypto Phishing Attack
  • 7. www.izoologic.com The script would make it look like it creates a fund transfer by executing the commands like a real user would, all while the procedure remains in stealth. Security researchers point out that it is the first time an attack has been seen to use this automated tactic. MEWKit has the feature to allow the phishing authors to survey how much Ethereum has been collected, as well as storing a record of private user keys and passwords which can be used for further attacks. With this new-type of phishing modus which focuses on both traditional and new generation phishing attacks, the best way to avoid being a victim is to ensure that the MyEtherWallet website is opened on the browser and not through click-through URLs. Always be careful when using online facilities, stay vigilant and pro-actively open sites via the browser URL itself. Crypto Phishing Attack
  • 8. Contact Us 14 Hanover Street, W1S 1YH City of Westminster, London UNITED KINGDOM +44 20 3734 2726 info@izoologic.com www.izoologic.com