SlowMist, a number one blockchain safety agency, launched its 2024 Q2 MistTrack Stolen Funds Evaluation report, trying intently at cryptocurrency thefts within the second quarter of 2024.
Primarily based on 467 experiences of stolen funds, the agency revealed three key weaknesses led to cryptocurrency theft and defined the strategies that customers can make the most of to guard their funds.
Personal Key Leaks High the Listing
In keeping with SlowMist, the second quarter of 2024 noticed a troubling enhance in safety incidents. Throughout this time, customers reported 467 instances of stolen funds, together with 321 from Chinese language sources and 146 from different nations.
The platform’s staff helped 18 victims lock almost $20.66 million price of funds throughout 13 firms. Moreover, the agency mentioned the principle causes of those incidents.
The commonest reason behind crypto theft is the mishandling of personal keys. Regardless of warnings, many individuals retailer their personal keys in Google Drive and different cloud providers. Some even ship this knowledge to mates by social networks and messengers. Hackers use credential stuffing assaults to log into these cloud providers and steal personal keys.
Learn extra: 15 Most Widespread Crypto Scams To Look Out For
One other frequent trigger of personal key leaks is faux wallets. These apps typically replicate official software program precisely, tricking customers into coming into personal keys and instantly transmitting them to attackers.
“Despite being an old issue, many users still inadvertently click on ads while using search engines and download fake wallet apps. Many users choose to download applications from third-party sites due to network reasons. Although these sites claim that their apps are mirrored from Google Play, their actual security is questionable,” learn the report.
Phishing additionally stays a serious reason behind theft within the crypto business. In keeping with SlowMist, about 80% of the primary feedback beneath tweets from distinguished challenge accounts are occupied by rip-off accounts.
Learn extra: Crypto Social Media Scams: The best way to Keep Secure
Pretend X (previously Twitter) accounts that spam beneath posts are offered in varied Telegram feeds. Attackers can choose profiles primarily based on the variety of followers and registration date. A lot of the pages being offered are associated to the crypto business and crypto influencers. Consultants additionally famous that some web sites promote faux X accounts.
“For example, a fake account named ‘Optimlzm’ can look almost identical to the real account ‘Optimism’. After purchasing the highly similar account, phishing groups use promotion tools to boost the account’s interactions and follower count, thereby increasing its credibility,” SlowMist consultants famous.
Honeypot Guarantees Mislead Crypto Customers
The third risk recognized by SlowMist is the honeypot rip-off. On this scheme, fraudsters create tokens that appear promising and provide excessive returns, however these tokens are programmed to be unsellable. Such a rip-off is especially rampant on decentralized exchanges like PancakeSwap.
“I asked a question in a Telegram group, and someone enthusiastically answered and taught me a lot. They suggested I invest in a new token in the primary market and provided me with a contract address on PancakeSwap. After I bought it, the token’s value kept rising. They told me it was a once-in-six-months golden opportunity and urged me to invest more. When I asked others in the group to help investigate, I discovered it was indeed a honeypot token. I could buy but not sell it,” one sufferer shared with SlowMist.
Learn extra: High 9 Most secure Crypto Exchanges in 2024

To cut back these dangers, SlowMist stresses the necessity for sturdy safety practices. They advocate utilizing blockchain explorers like Etherscan or BscScan, which supply insights by audit trails and consumer feedback, and browser extensions like Rip-off Sniffer, which may detect and alert customers about potential phishing websites.
The findings of this report spotlight the continuing vulnerabilities and underline the necessity for proactive safety measures by all members of the ecosystem.
Disclaimer
In adherence to the Belief Venture pointers, BeInCrypto is dedicated to unbiased, clear reporting. This information article goals to offer correct, well timed data. Nonetheless, readers are suggested to confirm details independently and seek the advice of with knowledgeable earlier than making any choices primarily based on this content material. Please be aware that our Phrases and Circumstances, Privateness Coverage, and Disclaimers have been up to date.