
Hackers Are Targeting Crypto Wallets: What You Need to Know
As the crypto space continues to grow, so do the threats targeting investors and project leaders. A new wave of scams exploiting Microsoft Teams has emerged, using social engineering tactics that trick victims into giving hackers full control of their desktops. Notable security researcher Nick Bax shared insights into this alarming development, revealing that millions of dollars have already been stolen.
How the Attack Works
This attack preys on a simple misconception—trust. Hackers infiltrate legitimate Twitter or Telegram accounts, or create convincing fake profiles, to initiate contact with their targets. The conversation often starts with an enticing proposal, such as a podcast feature, partnership opportunity, or investment discussion. It escalates when the hacker requests the victim to screen-share their project for a demonstration.
To gain further access, the hacker claims they need to share something as well. At this stage, they send a request through Microsoft Teams to “request control” of the victim’s screen. The wording of the prompt sounds routine, leading many to grant access without second-guessing the decision. Once the victim clicks accept, the hacker gains full remote control of their computer, leaving wallets, sensitive files, and passwords vulnerable.
Why Microsoft Teams Is a Target
Bax highlighted a key factor contributing to the success of this attack: the interface of Microsoft Teams. Unlike platforms such as Zoom that require multiple warning prompts before granting control, Teams uses a straightforward “Requesting control” dialog, which feels benign. The simplicity of the process works in hackers’ favor. Alarmingly, Bax even demonstrated how setting up a fake Teams account using Cyrillic letters to mimic “Microsoft Teams” is possible, further enabling deceptive tactics.
The attack is not only a flaw in user behavior but also a gap in UX design. This creates an environment ripe for exploitation, with hackers continuously evolving their strategies.
How to Protect Your Crypto Funds
Security experts emphasize that protecting your digital assets begins with vigilance. Here are actionable steps you can take to safeguard yourself:
- Verify the identity of any contact: Whether the approach is over Teams, Twitter, or Telegram, confirm the person’s legitimacy through additional channels.
- Be cautious with screen requests: Treat all screen-sharing permissions as high-risk and avoid granting control unless absolutely necessary.
- Limit access permissions: Disable screen control features in Microsoft Teams unless a trusted colleague or partner requires it.
- Enable additional protections: Use hardware wallets like the Ledger Nano X to store funds securely offline.
Nick Bax is also calling on Microsoft to improve warning prompts and enhance safeguards when users are granting control, a move that could minimize such attacks in the future.
The Bottom Line
The current rise in social engineering scams targeting crypto wallets is a powerful reminder of the importance of cybersecurity. Hackers are becoming more sophisticated, combining technical knowledge with psychological tricks to exploit unsuspecting users. By staying informed and taking precautionary measures, you can protect yourself and your investments from this growing threat.
Looking to enhance your online security? Consider combining strong cybersecurity practices with products that keep your assets secure, like a hardware wallet.