5 ‘insidious’ crypto scams to watch out for this year
2025-07-03 11:14:26 Primitive Reading

 

Crypto users faced a rise in “psychologically manipulative” attacks in the second quarter as hackers dreamt up advanced and creative ways to try and steal crypto, according to blockchain security firm SlowMist.

SlowMist’s head of operations, Lisa, said in the firm’s Q2 MistTrack Stolen Fund Analysis report that while it didn’t see an advancement in hacking techniques, the scams have become more sophisticated, with a rise in fake browser extensions, tampered hardware wallets and social engineering attacks.

“Looking back on Q2, one trend stands out: attackers’ methods may not be getting technically more advanced, but they are becoming more psychologically manipulative.”

“We’re seeing a clear shift from purely onchain attacks to offchain entry points — browser extensions, social media accounts, authentication flows, and user behavior are all becoming common attack surfaces,” said Lisa. 

Malicious browser extensions pretend to be security plugins

Ironically, one emerging attack vector involved browser extensions masquerading as security plugins, such as the “Osiris” Chrome extension, which claimed to detect phishing links and suspicious websites. 

Instead, the extension intercepts all downloads of .exe. .dmg and .zip files, replacing those files with malicious programs. 

“Even more insidiously, attackers would guide users to visit well-known, commonly used websites like Notion or Zoom,” said Lisa. 

“When the user attempted to download software from these official sites, the files delivered had already been maliciously replaced — yet the browser still displayed the download as originating from the legitimate source, making it nearly impossible for users to spot anything suspicious.”

These programs would then collect sensitive information from the user’s computer, including Chrome browser data and macOS Keychain credentials, giving an attacker access to seed phrases, private keys or login credentials. 

  Sensitive info from a victim’s computer is sent to the attacker’s server. Source: SlowMist

Attacks prey on crypto user anxiety

SlowMist said another attack method focused on tricking crypto investors into adopting tampered hardware wallets.

Disclaimer: This specification is preliminary and is subject to change at any time without notice. Amazon Finance assumes no responsibility for any errors contained herein.

Recommended reading
PunkVerse: A Capital Signal Behind the Global Rise of Experience Assetization

10-22     admin     13384 Reading

Hyperliquid Strategies Looks to Raise $1B to Fund HYPE Treasury Purchases

10-22     admin     18157 Reading

U.S. Senate Democrats Assure Crypto CEOs They're Still Willing to Move Legislation

10-22     admin     8326 Reading

Bitcoin Crash Off the Table as Four-Year Cycle is Dead: Arthur Hayes

10-22     admin     9186 Reading

SoftBank’s PayPay Buys 40% Stake in Binance Japan to Fuse Crypto With Cashless Payments

10-22     admin     7121 Reading

Bitcoin Slides Below $121K as Gold and Silver Rallies Take Breathers

10-22     admin     10467 Reading

Senate Democrats' Leaked Crypto Position Would Strangle DeFi, Industry Insiders Say

10-22     admin     11243 Reading

BTC, ETH, XRP, SOL Face Slow Bottoming Process After $16B Liquidation Shock

10-22     admin     8137 Reading

Russia Acknowledges Crypto’s Popularity With Its Citizens as Central Bank Weighs Bank Involvement

10-22     admin     8644 Reading

How 19-Year-Old Barron Trump Is Worth $150 Million

10-22     admin     10386 Reading

French Banking Giant ODDO BHF Enters Crypto With Euro-Backed Stablecoin EUROD

10-22     admin     7791 Reading

U.S. Targets Cambodian Pig Butchering, Takes $14B in Bitcoin as Biggest Ever Seizure

10-22     admin     7629 Reading

Sorare CEO still bullish on Ethereum despite ‘upgrading’ to Solana

10-22     admin     6958 Reading

Bitcoin and alts set for Fed ‘jolt,’ market isn’t ready: Economist

10-22     admin     9870 Reading

Jimmy Song slams Bitcoin Core devs for 'fiat' mentality on OP_Return

10-22     admin     8391 Reading