Wallet Drainers, Crypto Stealers and Cryptojacking
Jason Scharfman ()
Additional contact information
Jason Scharfman: Corgentum Consulting, LLC
Chapter Chapter 10 in The Cryptocurrency and Digital Asset Fraud Casebook, Volume II, 2024, pp 271-306 from Springer
Abstract:
Abstract This chapter analyzes wallet drainers, crypto stealers, and cryptojacking. It begins with a discussion of the types and uses of crypto wallets and vanity wallet addresses. We then analyze the anatomy of the Binance CZ Fake wallet attack case study including the use of dust transactions and crypto address poisoning. The chapter proceeds to discuss wallet drainers, crypto stealers, and information stealers. Next, we cover malware as a service (MAAS), distribution methods of wallet drainers, and ransomware. Finally, we conclude with an analysis of cryptojacking and illegal crypto mining operations.
Keywords: Digital asset wallet; Cryptojacking; Crypto stealers; Vanity wallet address; Dust transaction; Address poisoning; Malware as a service (MAAS) (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-3-031-60836-0_10
Ordering information: This item can be ordered from
http://www.springer.com/9783031608360
DOI: 10.1007/978-3-031-60836-0_10
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().