From counterfeiting to hacking: how criminals steal assets using malicious crypto apps

(no votes)

How do malicious crypto wallets work? What distribution schemes are used by attackers? And what measures can help maintain control over assets? Dmitry Poyda, an investigative analyst at Shard, AML/KYT provider, tells the PLUSworld portal about this and beyond.

How do malicious crypto wallets work? What distribution schemes are used by attackers? And what measures can help maintain control over assets? Dmitry Poyda, an investigative analyst at Shard, AML/KYT provider, tells the PLUSworld portal about this and beyond.


Journal:  PLUS №11 (331), 2025

Read in this issue: