Recently, we have received feedback from users about a new type of wallet security threat —— evil maid attack. An evil maid attack refers to an attack in which an attacker obtains permissions or performs malicious operations by directly accessing the victim's computer system or device. A physical contact attack.
Attackers can pretend to be various identities, such as servants, maintenance workers or couriers, to gain access to the victim's office or home. Once inside, they may plant a malicious device, such as a USB rogue device or keylogger, or directly control the victim's computer to execute malicious code.
This attack method ignores traditional network security strategies because the attacker has direct access to the victim's device, rendering many defensive measures ineffective. Therefore, when it comes to digital token security, we must remain highly vigilant and take effective security measures to guard against various potential threats.
Recently, a cryptocurrency investor named Jack was attacked by an evil servant while on vacation. He hired many servants in the villa. One fine morning, Jack was processing a cryptocurrency transfer when he suddenly received a phone call and temporarily left the room. Due to carelessness, I did not turn off the computer and lock the door. When he returned to the room, he found that most of the tokens in his wallet address had been stolen.
After investigation, it was discovered that a maid had inquired about his bedroom password, entered the bedroom to commit theft while Jack was on the phone, and disappeared afterwards.
The evil servant attack is a very stealthy physical hacking method. Attackers often disguise themselves as cleaners or service staff and quietly enter the victim's room. They take advantage of the brief window of time while the victim is away to hack computers or other devices to obtain sensitive information or tamper with data. In this case, Jack's maid could be an associate of the attackers, or a spy hired by the hackers.
PSA:
- Never leave a device alone in an unsafe environment, and lock the device or close apps even if you are away only briefly.
- Store assets dispersedly in multiple wallets. For important tokens, give priority to hardware wallets over software wallets.
- Create a contingency plan for lost or stolen devices, such as using Prey Anti-Theft , which provides remote locking, wiping data on the device, and tracking capabilities.
imToken Is Always Protecting Your Token Security
Risk Control
In February, imToken marked a total of 851 risky tokens; banned 704 risky DApp websites; and marked 37,862 risky addresses.
In addition, if you find any suspiciously risky tokens or DApps, please give us timely feedback: support@token.im to help more users avoid token losses.
Closing Thoughts
With scams continually evolving, it is indeed challenging for average users to fully prevent them. imToken is committed to rapidly detecting issues and finding solutions, providing timely messages to the community, and educating users about various types of scams to protect them from losses.
We encourage you to read and share imToken Wallet Security Monthly Report and join hands with imToken to safeguard your token security.