With the evolution of the cryptocurrency domain in the current era, there has also been a rise in frauds, thefts, and other illegitimate activities in the digital currencies niche.
Recently, the owners of popular crypto coin Zcash were taken a blow by the news of the discovery of a corrupt and malevolent pseudo version of ZecWallet, the native product of Zcash Foundation. The fake wallet was tracked down by the Zcash community, who also warned the users against the same.
The news came into light on October 20, 2019, through a Twitter post which was also retweeted by the official handle of Electric Coin Company, the proud Zcash curator.
🚨⚠️ PSA to all Zcash users! There is a fake version of ZecWallet that likely contains malware (size and checksum is different) double check you are downloading from official @zecwallet repo on GitHub: https://t.co/EpMyH5iCdp @ElectricCoinCo @ZcashFoundation @zooko pic.twitter.com/N9HklOH6gn
— mine Zcash ᙇ🛡️ᙇ (@mineZcash) October 20, 2019
In the past, a bug was discovered in the Zcash implementations and in a major portion of its forks. This had put the metadata containing the full nodes along with protected IP addresses, at the risk of getting leaked.
On October 18, 2019, leading antivirus software providing platform, ESET broke the news of a “trojanized” version of the Tor browser. The main aim of this deceitful application was to conduct the theft of Bitcoin from the owners in the darknet.
The destructive counterfeit version of the Tor Browser was designed to bring havoc in the Russian marketspace. It was injected into the system through two websites and has been involved in the theft of crypto assets from the darknet investors since 2017 by replacing the real crypto addresses.
In the same month, ESET also unveiled another malware named “Casbaneiro” or “Metamorfo.” These malicious programs were designed by the attackers with an intention to attack the banks and crypto services in Brazil and Mexico. Apparently, to date, the trojan has stolen a whopping sum of 1.2 BTC from the market.