EconPapers    
Economics at your fingertips  
 

Wallet Drainers, Crypto Stealers and Cryptojacking

Jason Scharfman ()
Additional contact information
Jason Scharfman: Corgentum Consulting, LLC

Chapter Chapter 10 in The Cryptocurrency and Digital Asset Fraud Casebook, Volume II, 2024, pp 271-306 from Springer

Abstract: Abstract This chapter analyzes wallet drainers, crypto stealers, and cryptojacking. It begins with a discussion of the types and uses of crypto wallets and vanity wallet addresses. We then analyze the anatomy of the Binance CZ Fake wallet attack case study including the use of dust transactions and crypto address poisoning. The chapter proceeds to discuss wallet drainers, crypto stealers, and information stealers. Next, we cover malware as a service (MAAS), distribution methods of wallet drainers, and ransomware. Finally, we conclude with an analysis of cryptojacking and illegal crypto mining operations.

Keywords: Digital asset wallet; Cryptojacking; Crypto stealers; Vanity wallet address; Dust transaction; Address poisoning; Malware as a service (MAAS) (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-031-60836-0_10

Ordering information: This item can be ordered from
http://www.springer.com/9783031608360

DOI: 10.1007/978-3-031-60836-0_10

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-02
Handle: RePEc:spr:sprchp:978-3-031-60836-0_10