Your Privacy is Important to us

We encourage you to review our Terms of Service, and Privacy Policy.

By continuing, you agree to the Terms listed here. In case you want to opt out, please click "Do Not Sell or Share My Personal Information" link in the footer of this page.

Opt out of the sale or sharing of personal information

We won't sell or share your personal information to inform the ads you see. You may still see interest-based ads if your information is sold or shared by other companies or was sold or shared previously.

Continue on TOI App
Open App
Login for better experience!
Login Now
Welcome! to timesofindia.com
TOI INDTOI USTOI GCC
TOI+
  • Home
  • Live
  • TOI Games
  • Top Headlines
  • India
  • City News
  • Photos
  • Business
  • Real Estate
  • Entertainment
  • Movie Reviews
  • Lifestyle
  • Podcasts
  • Elections
  • Web Series
  • Sports
  • TV
  • Food
  • Travel
  • Events
  • World
  • Music
  • Astrology
  • Videos
  • Tech
  • Auto
  • Education
  • Log Out
Follow Us On
Open App
  • News
  • Videos
  • India
  • Elections
  • World
  • City
  • Tesseract
  • Life & Style
  • Entertainment
  • Business
  • Tech
  • TOI Games
  • Cricket
  • Sports
  • TV
  • Web Series
  • Education
  • Speaking Tree
  • Success Story of Visionary Leaders
  • TOI Newsletters
  • Health
  • Real Estate
  • Legal
  • Defence
  • Women

7 Techniques cybercriminals use to steal cryptocurrency

Kiran Singh
| TIMESOFINDIA.COM | Last updated on - Jan 3, 2024, 17:48 IST
Comments
Share
1/7

Deceptive campaigns and fake websites

Cybercriminals initiate their schemes through fake airdrop campaigns or phishing tactics, often promoted on social media or via email. These campaigns entice users with promises of free tokens or other rewards, creating a facade of legitimacy.

2/7

Mimicking legitimate websites

Respondents to these campaigns are directed to fraudulent websites meticulously designed to resemble authentic token distribution platforms or wallet interfaces. Users find it challenging to differentiate between fake and genuine sites.

3/7

Wallet connection requests

Once on deceptive sites, users are prompted to connect their digital wallets. Under the guise of verifying identity or account information for token claims, this seemingly harmless step sets the stage for subsequent theft.

4/7

Interaction with malicious smart contracts

Users are led to interact with malicious smart contracts, often disguised as a necessary step to claim promised airdrops or benefits. These contracts include hidden functions that, when executed, compromise the security settings of the user's wallet or trigger unauthorized transactions.

5/7

Exploiting the 'Permit' function in ERC-20 tokens

Cybercriminals manipulate the 'Permit' function in ERC-20 tokens, tricking users into approving a spender's address off-chain with their private key. This allows the attacker to transfer tokens on the user's behalf without the need for on-chain transactions, making their actions less noticeable.

6/7

Stealthy asset transfer and obfuscation

Once access is gained, attackers transfer assets out of the user's wallet. They employ tactics such as cryptocurrency mixers and multiple transfers to obscure the trail of stolen assets, complicating the process of tracking and recovery.

7/7

No blockchain trace in some cases

Techniques like off-chain signing, as seen in the 'Permit' function, leave no direct trace on the blockchain. The absence of a clear on-chain transaction makes it exceptionally challenging to detect and trace fraudulent activities.

Start a Conversation

Post comment
Photostories
  • From facing rejections over her dark skin tone to refusing a fairness cream ad film: When The Kerala Story 2 actress Ulka Gupta spoke about her struggles
  • Cannes 2026: Aishwarya Rai Bachchan sets the red carpet on fire in a blue crystal gown by Amit Aggarwal
  • 5 most beautiful parrots in the world that look almost unreal
  • Aam Panna to Lassi: 10 traditional Indian summer drinks & their calories per serving
  • All about Harry Styles and his USD 30 million real estate investments over the years
  • India’s most mystical and lesser-known mangrove forests travellers rarely talk about
  • PM Narendra Modi gifts traditional Eri silk stole for Giorgia Meloni: Know its history and cultural importance
  • What is Lormalzi? Expert explains how it works and who it’s meant for
  • How to beat heatwave: 5 Himalayan towns in India where summer is pleasant
  • Ashish Nehra's luxurious Goa home is a multi-crore home designed for peaceful family living, away from fast-paced cricketing world
Explore more Stories
  • 11
    Pakistan, China and 6 other countries behind most political cyberattacks
  • 21
    First-ever National Creators Award announced: Here's the full list of winners
  • 13
    Anant Ambani wedding: Bill gates shares India visit in photos
  • 7
    March 15 is last day to change some Aadhaar details for free: What you can do, how to update details and more
  • 7
    Aadhaar updation, FASTag KYC and 4 other deadlines you can’t miss in March
Up Next
  • News
  • /
  • Gadgets News
  • /
  • 7 Techniques cybercriminals use to steal cryptocurrency
About UsTerms Of UsePrivacy PolicyCookie Policy

Copyright © May 22, 2026, 11.55PM IST Bennett, Coleman & Co. Ltd. All rights reserved. For reprint rights: Times Syndication Service