Category: common-scams

Fake Wallet Generators

What is a Crypto Wallet?

There are a number of functions that a cryptocurrency wallet performs. Essentially, a cryptocurrency wallet is a physical instrument, program or service that stores private keys for cryptocurrency transactions. In addition to storing keys, a cryptocurrency wallet is also able to provide capabilities to encrypt and sign for information. Signing can assist with the implementation of a smart contract, a cryptocurrency transaction, identification and the legal authorization of a document.

Furthermore, a cryptocurrency wallet may include one or more of the following features.

Simple cryptocurrency wallet

A simple cryptocurrency wallet includes pairs of private and public cryptographic keys. These keys can be used by individuals to send or receive cryptocurrencies as well as track the ownership of a wallet and its contents. A private key allows for the spending of cryptocurrencies from that particular address while a public key enables individuals to make payments into that address. Cryptocurrency is not itself stored in a wallet, rather, it is stored in a decentralized space and is maintained in a distributed ledger that is publicly available. This distributed ledger is called the blockchain.

Multisignature Wallet

Simple cryptocurrency wallets have the facility to allow one party to sign a transaction whereas multisignature wallets require the authorization from multiple parties. They are specifically designed to have increased protection and security.

Smart Contract

When dealing with cryptocurrencies, smart contracts are signed the same way a cryptocurrency transaction is signed whereby the signing keys are secured in a cryptocurrency wallet.

eID Wallet

eID stands for electronic identification. Certain wallets are designed with the intention to work with and be compatible within a system.

What a crypto wallet does

As previously discussed, a crypto wallet, or digital wallet stores and keeps track of encryption keys that are used to digitally sign transactions. In addition to this, it also stores addresses on the blockchain where a particular asset is located. If the owner of a crypto wallet loses their address, it would result in them technically losing command over their digital assets.

There are two principal types of crypto wallets; hardware and software, also commonly referred to as hot and cold storage wallets.

1.Hot Storage Wallets

Hot storage wallets are accessed online through internet services such as Coinbase, Electrum and Mycelium. These online sites provide security for users and can further be divided into online wallets and physical wallets which can be managed on a user’s personal computer or mobile device.

2. Cold Storage Wallets

Cold storage wallets can be downloaded and stored offline on hardware such as a smartphone or USB drive. Bitcoin Core and Atomic Wallet are two examples of cold wallet storage software. In addition, It is also possible to purchase cold storage wallets as devices with the software already installed. Ledger and Trezor are two popular cold storage wallets.

Hardware wallets can be segmented further into crypto-assist wallets that primarily handle the keys and signing of data. These are sometimes referred to as hardware security modules (HSMs). Then, there are hardware wallets that are responsible for generating and signing complete transactions which are then sent on to the distributed ledger network.

QR Codes and Fake Wallet Generators

A QR code is a quick, simple and secure way that holders of cryptocurrency can share addresses when transferring cryptocurrencies from one device to another. It is particularly useful when involved in face-to-face point-of-sale transactions as it avoids the need to physically type in long sequences of code. Incorrect or missing codes can render the transaction invalid.

Bitcoin and crypto addresses are frequently changed into distinctive, scannable QR codes to help facilitate payments without the need for users to type out an entire address. There are many legitimate online sites that offer this facility however fake sites do not generate a new QR code. Instead, a scam website will display the QR code that directs funds to the scammer’s wallet. Any individual that falls for the scam and shares the code with the idea that it directs to their wallet will eventually realise that it was going to the wrong address.

This particular scam is unfortunately growing in popularity as QR codes cannot be verified for types and users need to confirm in advance that the services used to generate codes are respected and trustworthy.

Other Scam Techniques

In addition to QR codes that lead crypto holders to fake addresses, some scammers use other techniques:

  • Customizing the address | Bitcoin, for example, supports multiple address formats. Common addresses begin with the number “1” while pay to script starts with the number “3” and Bech32 addresses begin with the letters “bc”. Some scam sites create a QR code with the same format as the requested address to make detection more difficult following a quick verification.
  • Adding addresses to the clipboard | Some scam websites add their addresses to the clipboard, so if victims verify the QR code by pasting the value in the clipboard, it will be an instant match.

For users that need to export an address as a QR, it is recommended to use a well known and trusted site, verify the QR before sharing it by scanning it with a wallet app and comparing addresses and using a threat intelligence service that alerts you before you using a scam website or address.

How to Increase Crypto Wallet Security

To start, it’s recommended to store your cryptocurrency in a cold wallet. This can be further secured by creating a physical copy of the keys and storing this copy in a safe and secure place such as a bank safety deposit box.

A physical copy can also be used as a wallet through software that creates a QR code that can be scanned on or to enable blockchain transactions.

Another option is to use an online platform with a wallet service that requires two-factor authentication by using push technology. This technology links the second factor to a registered mobile device which is the only instrument that can approve a request by the exchange wallet’s verification service.

Crypto scammers also have the ability to steal the SIM identity of mobile phones with phone-based wallets by circumventing phone authentication techniques. The techniques involved can include SIM swaps and planting malware onto crypto owners’ devices.

In Conclusion

The most difficult aspect when it comes to storing assets on a digital wallet is the fact that it’s responsible for securing small amounts of highly sensitive and valuable information.

There are multiple ways to mitigate a crypto wallet attack however the best recommendation is to use some type of hardware wallet and to ensure you keep a hard copy of your secret keys in a safe location.

Add Your Heading Text Here