From counterfeiting to hacking: how criminals steal assets using malicious crypto apps
How do malicious crypto wallets work? What distribution schemes are used by attackers? And what measures can help maintain control over assets? Dmitry Poyda, an investigative analyst at Shard, AML/KYT provider, tells the PLUSworld portal about this and beyond.
How do malicious crypto wallets work? What distribution schemes are used by attackers? And what measures can help maintain control over assets? Dmitry Poyda, an investigative analyst at Shard, AML/KYT provider, tells the PLUSworld portal about this and beyond.
Journal: PLUS №11 (331), 2025
Tweet
Read in this issue:
- Autumn PLUS-Forums: Armenia and Kazakhstan crown the 2025 season! Dispute between banks and marketplaces – what do experts say?
- Sibos 2025. Digital assets of the year: analysis and forecasts
- PLUS-Forum Digital Tajikistan 2025. AI, GovTech, and Cybersecurity – key elements of digital transformation
- Professions of the digital ruble. Part One. Smart contracts for everyone?
- Cybersecurity in Armenia is becoming a conscious necessity
- From counterfeiting to hacking: how criminals steal assets using malicious crypto apps
- Digital Transformation of Armenia 2025
- Armenia. Key fintech trends 2025–2026
- DeFi and traditional banking systems: how banks are adapting to new financial market conditions
- The anatomy of the ideal payment in 2025: speed of the Faster Payment System, AI security, and the versatility of QR Code
- Development divers and prospects for bank digitalization in Central Asia and the South Caucasus
- How robots are changing ATM testing: T-Bank's experience
- Digital decoupling: how this method of reshaping IT architecture helps banks grow
- Banking chatbots. From information support to financial assistant
- AI in business: how to reduce costs without compromising quality
- Current status and key trends of the cryptocurrency industry in 2025
- The impact of DFAs on the e-commerce market: examples of China and Russia
