
ID:
electrum-453
100 pts
Platform:
Type:
Category:
Method:
Data Sources:
Wallet
Front-end Vulnerabilities
Extended Method:
Vulnerability software client, fake software updates
Days in Operation:
0





100 pts each
An investigation by ZDNet revealed that hackers stole $22 million from users of Bitcoin wallet Electrum by enticing users to install fake software updates by setting up their own ElectrumX gateway server. Since 2018, cybercrime gangs have been abusing this loophole to spin up malicious servers and wait for users to randomly connect to their systems. When this happens, the attackers instruct the server to show a popup on the user's screen, instructing the user to access an URL and download and install an Electrum wallet app update. Usually, this update download link is not for the official Electrum website, located at electrum.org, but to lookalike domains or GitHub repositories. If users don't pay attention to the URL, they eventually end up installing a malicious version of the Electrum wallet, which the next time the user tries to use will ask for a one-time passcode (OTP).
DISCLAIMER: While web3rekt has used the best efforts in aggregating and maintaining this database, this web site makes no representations or warranties with respect to the accuracy or completeness of its information and data herein, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall web3rekt be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the data and information derived from this database.