{"id":558,"date":"2022-05-25T09:15:59","date_gmt":"2022-05-25T09:15:59","guid":{"rendered":"https:\/\/guardarian.com\/blog\/?p=558"},"modified":"2026-03-17T09:03:36","modified_gmt":"2026-03-17T09:03:36","slug":"microsoft-defending-hot-wallets-from-cryware-attacks","status":"publish","type":"post","link":"https:\/\/guardarian.com\/blog\/microsoft-defending-hot-wallets-from-cryware-attacks","title":{"rendered":"Microsoft defending hot wallets from Cryware attacks"},"content":{"rendered":"<p class=\"p1\">The more popular a new technology gets, the more likely it is for scammers and hackers to show up and try to take advantage of the loopholes in its system. This is an age-old story that has repeated itself over and over again throughout the years, and it appears to take place right as we speak in the crypto industry.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">The crypto market has definitely had its share of ups and downs over the years, but recently, because of multiple internal (the emergence of NFTs for example) and external factors (celebrities getting into the industry), the cryptocurrency market capitalization has been on a steep rise, to say the least.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">With this rise in popularity though we\u2019ve also seen a steep rise in a brand-new type of threat, known as <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/17\/in-hot-pursuit-of-cryware-defending-hot-wallets-from-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">cryware<\/a>.<\/p>\n<h2>What Are Cryware Attacks?<span class=\"Apple-converted-space\">\u00a0<\/span><\/h2>\n<p class=\"p1\">Cryware is the term that is now used to refer to information stealers that attack non-custodial cryptocurrency wallets, which also go by hot wallets. These individuals gain access to your hot wallet data and then they transfer all of your money directly to their wallets. Sadly, this is irreversible a hundred percent of the time, due to the fact that while on the blockchain, any transactions are final, you can never trace back where your money went off to and you can never ask for a refund.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">How can they do this though? Essentially, data stealers can do this by clipping and switching, memory dumping, scams, phishing or they can just simply use simple word matching or regular expressions methods to gain access to your hot wallet.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<h2>New Malware and Crypto Attacks<span class=\"Apple-converted-space\">\u00a0<\/span><\/h2>\n<p class=\"p1\">Microsoft themselves have issued multiple statements discussing these new attacks and how they\u2019re planning on fighting back against them. Amongst the most commonly found threats that you\u2019ll have to deal with you have the following:<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">Cryptojackers<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<\/ul>\n<p class=\"p1\">This form of threat emerged way back when cryptocurrency first came about. We know that in order to <a href=\"https:\/\/guardarian.com\/blog\/what-is-yield-farming-liquidity-farming\/\">farm<\/a> cryptocurrency you need to use your computer\u2019s resources, and as such, these cryptojackers will use mining malware which takes over your device and uses its resources for their gain without you even knowing that it\u2019s happening in the first place. We\u2019ve had several millions of cryptojacker reports last year alone, which means that although it is quite an old issue it is still prevalent to this day.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">Ransomware<\/li>\n<\/ul>\n<p>This type of threat involves you being hacked and then blackmailed into paying a ransom payment to the people in charge of the attack.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li>Password and Info Stealers<\/li>\n<\/ul>\n<p class=\"p1\">There are plenty of ways that hackers can make use of to hack your data, with their main target being sign-in credentials, keystrokes, and even your system information as a whole since this can all be found on your hot wallet data.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">ClipBanker Trojans<\/li>\n<\/ul>\n<p class=\"p1\">Trojan malware used to be very commonly found in the past as the virus would check your clipboard and steal all of your banking information amongst other such sensitive data. Nowadays the malware has also been updated to monitor your cryptocurrency addresses also.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-564\" src=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters.png\" alt=\"\" width=\"799\" height=\"502\" srcset=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters.png 799w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters-300x188.png 300w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters-768x483.png 768w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters-400x250.png 400w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/fig1-2021-cryware-encounters-480x302.png 480w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Source: Microsoft.com<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2 class=\"p1\">Defending Against Cryware<span class=\"Apple-converted-space\">\u00a0<\/span><\/h2>\n<p class=\"p1\">As of 2021, according to Microsoft themselves, cryptocurrency crime has reached an all-time high, with well over USD10 billion worth of assets having been taken over through the use of ransomware and other instances of cryptocurrency theft.<span class=\"Apple-converted-space\">\u00a0<\/span>While we do still believe that cryptocurrency trading is still a largely positive and beneficial practice, it can also be quite risky to take part in these days.<span class=\"Apple-converted-space\">\u00a0<\/span>To combat this threat, Microsoft has created several means of protection, including the following:<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">Microsoft Defender Antivirus<\/li>\n<\/ul>\n<p class=\"p1\">This app is meant to offer you protection, detecting instances of cryware, cryptojackers, and pretty much any other cryptocurrency-related threats out there.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">Microsoft Defender SmartScreen<\/li>\n<\/ul>\n<p class=\"p1\">This tool can be found on Microsoft Edge amongst other web browsers out there, defending your account from any phishing attempts and preventing any outside program that may install fake apps and other such malware on your computer.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\">Microsoft 365 Defender<\/li>\n<\/ul>\n<p class=\"p1\">This app is mostly used by organizations to protect themselves against any threats. It is backed by a global network of security experts who work tirelessly to protect your company\u2019s data from any new or old attacker tools and techniques.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">Besides directly employing the use of these tools, you can also follow these steps to protect yourself against any sort of hot wallet attacks out there:<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><b>Lock hot wallets when you\u2019re not trading anything<\/b><\/li>\n<li class=\"li1\"><b>Disconnect any of the sites that may or may not be connected to your hot wallet<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/li>\n<li class=\"li1\"><b>Always double-check the information before you copy and paste it<\/b><\/li>\n<li class=\"li1\"><b>Never store private keys in plain text<\/b><\/li>\n<li class=\"li1\"><b>Only use wallets that utilize multifactor authentication<\/b><\/li>\n<li class=\"li1\"><b>Terminate any and all browser sessions as soon as the transactions are finished<\/b><\/li>\n<li class=\"li1\"><b>Double-check any and all links to wallet websites or applications of this sort<\/b><\/li>\n<li class=\"li1\"><b>Always think twice before you go through with any hot wallet transactions<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/li>\n<li class=\"li1\"><b>Never allow any third party or wallet app developers to access your private keys or seed phrases<\/b><\/li>\n<li class=\"li1\"><b>Always use a hardware wallet, unless you need to specifically be connected to a device<span class=\"Apple-converted-space\">\u00a0<\/span><\/b><\/li>\n<li class=\"li1\"><b>Always have file name extensions revealed on downloaded and saved files<\/b><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2 class=\"p1\">The Security Measures of Guardarian<span class=\"Apple-converted-space\">\u00a0<\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-570\" src=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security.png\" alt=\"\" width=\"983\" height=\"455\" srcset=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security.png 983w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security-300x139.png 300w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security-768x355.png 768w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security-980x454.png 980w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/security-480x222.png 480w\" sizes=\"auto, (max-width: 983px) 100vw, 983px\" \/><\/p>\n<p class=\"p1\"><a href=\"https:\/\/guardarian.com\">Guardarian<\/a> is a non-custodial, fully legit exchange service that utilizes KYC and AML to ensure the fact that both the service provider and the client\u2019s security during the transaction is taken care of. But what are KYS and AML and how can we trust our life savings on them? Let\u2019s find out together.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<ol>\n<li class=\"p1\">KYC, or Know Your Client, is a standard that essentially allows investment advisors to know everything that they need to know regarding their risk tolerance, investment knowledge, and of course, their financial position above all else. KYC simply put becomes the safety net that ensures that both the investment advisors and the client are going to walk out of the transaction happy with the result. In simpler terms, KYC represents an ethical and moral requirement that keeps both two parties involved in the process on equal grounds.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li class=\"p1\">AML or Anti-Money Laundering represents the process of verification that ensures the fact that both of the identities that the customers provided are legit.<span class=\"Apple-converted-space\">\u00a0<\/span>This process also forces the financial institutions to specify whether any risks may come from the transaction as a whole.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<\/ol>\n<p>As a whole though, you can expect the following features to be found within the Guardarian\u2019s security system:<span class=\"Apple-converted-space\">\u00a0<\/span>Speed, Simplicity, and Security.<\/p>\n<p class=\"p1\">To get through a transaction, you will simply need to go to the <a href=\"https:\/\/guardarian.com\">website<\/a>, select the Fiat currency and the amount that you wish to exchange. Then, provide your phone number, and verify yourself by uploading a front and back picture of your passport, ID card, or residence permit. Afterwards, just go through facial verification and you can make the payment directly with a credit\/debit card, or through a bank transfer.<\/p>\n<h2 class=\"p1\">Conclusion<span class=\"Apple-converted-space\">\u00a0<\/span><\/h2>\n<p class=\"p1\">Hopefully, the landscape will change for the better shortly as we would like to see a lot more security being added to the industry that so many of us have poured our life savings into.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">Sadly, as time moves on it appears as though more and more malware and crypto attacking strategies will start to appear. To counter these, many websites will have to adapt and improve their security systems to make sure that both their clients and investment advisors can go through their transactions without any problems.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p class=\"p1\">We will always try our hardest to confer your safety, we can promise you that much. As time moves on, we will always try to stay ahead of these cryware attacks and make sure that you can safely use our platform!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-571\" src=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/guardarian-gateway-1.png\" alt=\"\" width=\"700\" height=\"466\" srcset=\"https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/guardarian-gateway-1.png 700w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/guardarian-gateway-1-300x200.png 300w, https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/guardarian-gateway-1-480x320.png 480w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The more popular a new technology gets, the more likely it is for scammers and hackers to show up and try to take advantage of the loopholes in its system. This is an age-old story that has repeated itself over and over again throughout the years, and it appears to take place right as we [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[174,109],"tags":[],"class_list":["post-558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency-news-and-insights","category-academy-and-crypto-guides"],"uagb_featured_image_src":{"full":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690.jpg",1900,1446,false],"thumbnail":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690-300x228.jpg",300,228,true],"medium":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690.jpg",1900,1446,false],"medium_large":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690-768x584.jpg",768,584,true],"large":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690-1577x1200.jpg",1577,1200,true],"1536x1536":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690-1536x1169.jpg",1536,1169,true],"2048x2048":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-2048x1365.jpg",2048,1365,true],"rpwe-thumbnail":["https:\/\/guardarian.com\/blog\/wp-content\/uploads\/2022\/05\/ed-hardie-Y5PSyMm8nMk-unsplash-scaled-e1653470079690-45x45.jpg",45,45,true]},"uagb_author_info":{"display_name":"guardarian_admin","author_link":"https:\/\/guardarian.com\/blog\/author\/guardarian_admin"},"uagb_comment_info":5,"uagb_excerpt":"The more popular a new technology gets, the more likely it is for scammers and hackers to show up and try to take advantage of the loopholes in its system. This is an age-old story that has repeated itself over and over again throughout the years, and it appears to take place right as we&hellip;","_links":{"self":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":13,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/558\/revisions"}],"predecessor-version":[{"id":4246,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/posts\/558\/revisions\/4246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/media\/575"}],"wp:attachment":[{"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/media?parent=558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/categories?post=558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guardarian.com\/blog\/wp-json\/wp\/v2\/tags?post=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}