News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

How do people steal crypto wallets via malware? : malware | Torhoo darknet markets

I've seen countless projects on github of wallet stealers. They work as intended, but the problem is you just get the wallet files, you still need the password to get in the wallet and drain the crypto.

As far as I know, cracking those passwords is not a realistic solution as it would take way too long.

So how do people actually steal wallets? How do they use the wallet files they get from their stealer?

Do people just keylog the victims until they get the password? That seems like a lot of work/time and not scalable at all.
/u/fiom
1 points
3 weeks ago
There are 3 ways(that I know of that you can do this):
- Clipper malware -> basically this redirects the transactions that the person is trying to send to a legittimate account and redirects it to yours
- Phishing sites -> you probably know what this is
- Infostealer malware -> a malware that can extract all login details on a machine, if you're aiming for windows, you'll have to learn the DPAPI to decrypt the locally stored passwords, for other OS' I don't know.
/u/Saides 🍼
1 points
1 week ago
it may crypto drainer also?
/u/CorruptedPirate
1 points
2 weeks ago
I think they also uses Mimikatz to dump the local stored passwords or the other ideas they uses a keylogger with a backdoor from which the attackers can do MITM to the victim. Hope this helps you to get an idea..
/u/_Ph4nt0m_
1 points
1 week ago
What people usually do is to use a infostealer. This infostealer gets all the passwords in the machine like the ones saved in the browser and with those generates a password dict for that victim. Also, the stealer will get the wallet files ofcourse and then try to decrypt with that password list, if that doesnt work, the most reliable way is just to wait for the guy to type the password using a good keylogger.

You could try to use a clipper malware that changes the clipboard of the wallet address for yours and they send YOU the money instead. I didn't use it tho, but would be cool

And yeah, using a keylogger is not that tedious, if you create a good keylogger you can automate all this process in your C2 by creating scripts that extracts the password from the logs and tries to decrypt automatically. Just be creative
/u/bacilvaalderson 🍼
1 points
5 days ago
Hello, I have created a new site and I want to share it with you and ask your friends for their opinions on my new project, but according to the rules, I cannot post links. Please advise me on how I can share the site link.
/u/3cantaMurm3xFl0x 🍼
1 points
4 days ago
Hey, might be better to post that in a more relevant thread or sub. This topic’s focused on wallet stealers and password access don’t think site promotion really fits here