← All Defender Guides
Money & Crypto

How Hackers Hack Cryptocurrency Wallets — and How to Protect Yourself

How attackers steal cryptocurrency and how to defend your wallet.

🛡️
Defender's Guide This is a defender-focused resource covering attack patterns at a conceptual level so you can recognise threats and protect yourself or your organisation. The page does not include step-by-step exploitation procedures. If you suspect you are currently being targeted or have been compromised, scroll to the recovery section below.

What attackers want from Cryptocurrency Wallets

Cryptocurrency wallets occupy a uniquely high-stakes security position because of how irreversible compromise typically is. Unlike banking fraud where regulatory frameworks and reversibility provide some safety net, crypto theft is essentially permanent — once funds leave your wallet to an attacker-controlled address, there is rarely any meaningful path to recovery. The financial loss potential is high; the recovery options are minimal.

Attackers invest heavily in crypto-targeting capabilities because of this combination — large potential payouts and minimal recovery. The threat landscape is more sophisticated than typical consumer security: clipboard hijackers replacing copied wallet addresses, malicious browser extensions targeting wallet interfaces, supply chain compromises of legitimate crypto software, fake wallet apps in app stores, address poisoning attacks via dust transactions.

For most crypto users, the protection priorities are concrete: hardware wallets for any non-trivial amounts, careful seed phrase storage (offline only, multiple copies in secure locations, never in cloud or photos), scepticism about every transaction interaction, and operational security awareness around what wallet addresses you publicise. Common mistakes — seed phrase in iCloud, hot wallet for life savings, signing transactions without verification — lead to total irreversible loss.

How attackers actually do it

Conceptual attack categories, not exploitation procedures. Understanding these patterns is what lets you recognise and defend against them.

Seed phrase theft via cloud backup compromise

Users often back up seed phrases to cloud (iCloud Notes, Google Drive, password manager). When cloud account is compromised — even years later — attacker finds seed phrase and drains wallet. Highest-volume crypto theft pattern for typical users. Seed phrase should never be in cloud storage of any kind.

Phishing for seed phrase

Sophisticated phishing impersonating wallet support, exchange support, or wallet recovery flows asking users to enter seed phrase to "verify ownership", "fix wallet issue", or "claim airdrop". Legitimate wallet operations NEVER require entering seed phrase anywhere except during initial wallet setup or recovery. Any request for seed phrase is by definition fraud.

Malicious wallet apps in app stores

Fake wallet apps that look like legitimate wallets (MetaMask, Phantom, Trust Wallet, etc.) periodically appear in app stores and slip through review. Funds sent to these wallets are immediately accessible to attacker; "wallets" capture seed phrases entered during setup. Major problem on Android due to easier app submission; less common but not absent on iOS.

Clipboard hijacking malware

Malware monitors clipboard for cryptocurrency addresses (recognisable patterns) and replaces them with attacker-controlled addresses. User pastes attacker address thinking they are pasting their copied address; transaction sent to attacker. Particularly dangerous because the attack is transparent — user does not realise the address changed.

Malicious browser extensions targeting wallet interfaces

Browser extensions with wallet-related permissions can manipulate wallet interfaces, intercept seed phrases entered, modify transaction details before signing. Some explicitly malicious; others legitimate but compromised by attacker. Browser extension hygiene matters significantly for crypto users.

Smart contract approval abuse

When users interact with DeFi protocols, they grant token approvals to smart contracts. Malicious or later-compromised contracts can drain approved tokens. Excessive approvals (unlimited spend instead of specific amount) common; users rarely revoke approvals after using a service. Each unrevoked approval is potential attack vector.

Supply chain compromise of legitimate wallet software

Wallet software, related libraries, or dependencies compromised in supply chain attacks. Legitimate-looking updates contain malicious code that exfiltrates seed phrases or modifies transactions. Documented incidents have affected major wallet ecosystems. Users running latest version may be exposed if compromise occurred recently.

Address poisoning attacks

Attacker sends tiny "dust" transactions from addresses that look similar to addresses victim has previously transacted with. Victim copying from transaction history may copy the malicious address (looks similar) and send subsequent transactions there. Particularly common in well-known transaction patterns.

Physical attacks ("$5 wrench attack")

For users known to hold significant cryptocurrency, physical coercion or kidnapping attacks have been documented. The "$5 wrench attack" — coercion to access wallets via physical violence — is real and has occurred. Operational security around crypto holdings (not publicising, hardware wallets with PINs, multisig for large holdings) addresses this threat category.

How to recognise compromise

Signs that your cryptocurrency wallets may have been compromised:

Wallet balance suddenly zero or significantly reduced

Most direct sign — funds moved without your action. Check transaction history for the outflow. Once funds have moved, recovery is rarely possible; immediate response is incident-management rather than fund-recovery.

Pending transactions you did not authorise

If wallet shows pending outgoing transactions you did not initiate, immediate action required. May be possible to interfere if transaction not yet confirmed (depending on chain and circumstances); check wallet documentation for cancellation procedures.

Unexpected smart contract interactions in transaction history

Approvals, swaps, or other contract interactions you did not initiate indicate compromise. Even small unexplained transactions are concerning — sometimes attackers test access with small interactions before larger drainage.

Wallet address changed on copied addresses

If addresses you copy from one place are different when pasted, clipboard hijacking malware is present. Verify carefully on every transaction.

Seed phrase request from any source

Any request to enter your seed phrase is fraud. No legitimate wallet operation, support process, or recovery procedure requires entering seed phrase except during initial setup or wallet recovery in your own wallet app. If seed phrase is requested, it is an attack.

Wallet behaving differently than expected

UI changes, unexpected prompts, balance display issues that started after specific events (browser update, new extension installed, OS update, new app installed) suggest investigation.

What actually protects you

Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.

Use hardware wallet for any non-trivial amounts

Hardware wallets (Ledger, Trezor, Coldcard, BitBox, GridPlus) keep private keys on dedicated devices that never expose keys to internet-connected systems. Transactions are signed on the hardware device after physical confirmation. Defeats most software-based attacks. The cost ($50-200) is trivial compared to amounts being protected.

Seed phrase: offline only, multiple copies, secure locations, NEVER cloud

Seed phrase written on paper or stamped on metal (Cryptosteel, Billfodl, similar). Multiple copies in geographically-separated secure locations (home safe, bank safe deposit box, trusted family member). NEVER in iCloud, Google Drive, photos, password manager (debatable), email, or any electronic storage with cloud backup. Single seed phrase loss to compromise typically means total fund loss.

Verify destination addresses character-by-character on every transaction

Clipboard hijacking and address poisoning specifically defeated by careful address verification. Look at first and last several characters; for high-value transactions, verify entire address. Use hardware wallet display (which shows actual address being signed) rather than relying on screen of compromised computer.

Never share seed phrase with anyone or anywhere

No legitimate purpose requires sharing seed phrase. Wallet "support" asking for seed phrase is fraud. "Recovery services" asking for seed phrase are scams. The rule has no exceptions; teach this to everyone in your life.

Use small "hot wallet" for daily activity, hardware wallet for storage

Common pattern: small amount in hot wallet (browser extension or mobile app) for active use; majority of holdings in hardware wallet, accessed only for occasional larger transactions. Limits exposure if hot wallet compromised; transactions on hardware wallet require physical access.

Audit and revoke smart contract approvals regularly

Tools like Revoke.cash, Etherscan token approvals, similar tools for other chains let you see and revoke smart contract approvals. Quarterly audit; revoke approvals to contracts no longer in active use. Particularly important after using DeFi protocols where unlimited approvals are common.

Use minimal browser extensions; verify their legitimacy carefully

Browser extensions with wallet-related permissions are high-value targets for compromise. Use only well-established extensions from clear ownership. Audit installed extensions periodically. Consider dedicated browser profile for crypto activity with no other extensions.

Verify wallet software downloads carefully

Download wallet software only from official sources (official website typed directly, not via search results). Verify checksums where provided. Avoid wallet apps from unofficial app stores. Major wallet brands have been impersonated; due diligence on download sources matters.

For substantial holdings: multisig wallets

Multi-signature wallets require multiple keys (typically 2-of-3 or 3-of-5) to authorise transactions. Even compromise of one key does not lead to fund loss. Operationally complex; appropriate for substantial holdings or organisational treasuries. Major wallets (Gnosis Safe, Casa, Unchained Capital, Nunchuk) provide multisig solutions.

Operational security: do not publicise holdings or addresses unnecessarily

High-profile crypto holders are targeted by both online attacks and physical attacks. Discretion about holdings, addresses, and identifying information reduces targeting. The crypto culture sometimes encourages public discussion of holdings; resist this for security reasons regardless of cultural pressure.

For airdrops and new tokens: due diligence before signing anything

Many "airdrop" opportunities are wallet drains — interactions request signature that grants attacker access to existing tokens. If something seems too good to be true (free tokens for connecting wallet), it almost always is. Specifically, never sign transactions you do not understand; use tools that decode transaction details before signing.

Consider using a clean device specifically for crypto transactions

Dedicated laptop or device used only for crypto, not used for general browsing/email/social media, dramatically reduces malware exposure. Higher-value users particularly benefit. The operational overhead is justified by the security improvement for substantial holdings.

Frequently Asked Questions

Seed phrase (also called recovery phrase, mnemonic) is a sequence of typically 12 or 24 words that mathematically generates all the private keys for your wallet. Anyone with the seed phrase can recover the wallet on any device — meaning anyone with seed phrase has full control of all funds. Seed phrase is the master credential; protect it accordingly.
Debatable. Reputable password managers (1Password, Bitwarden) have strong security; storing seed phrase there has some risk if password manager is compromised but provides good protection in normal scenarios. For substantial holdings: offline storage (paper, metal) is safer. For typical small holdings: password manager is reasonable. Either way: NOT in cloud notes, photos, email, or any unencrypted cloud storage.
Significantly. Hardware wallets keep private keys on dedicated devices isolated from internet-connected systems. Transactions are signed on the hardware device after physical confirmation. Defeats most software-based attacks (malware on computer, browser extensions, clipboard hijacking) because keys never touch the compromised computer. The $50-200 cost is trivial compared to amounts being protected.
Custodial: a service holds your private keys (Coinbase, Kraken, etc. exchange wallets). You access your funds via service's authentication; service can freeze your account, has KYC obligations, may have insurance. Non-custodial: you hold your private keys (MetaMask, Ledger, Phantom, etc.). You have full control; you have full responsibility; lost seed phrase means lost funds permanently. Different security models with different tradeoffs; choice depends on your priorities and threat model.
Mostly correct for typical cases. The cryptography that protects your funds also makes transactions immutable. Funds sent to an attacker-controlled address are essentially in their possession; cannot be clawed back via wallet operations. Exceptions: theft via custodial exchange account where exchange can intervene, theft to addresses controlled by KYC-verified entity that can be legally compelled, occasional law enforcement action against major theft schemes. For typical individual theft, recovery rate is essentially zero.
Major regulated exchanges (Coinbase, Kraken, Binance, etc.) generally have reasonable security for customer accounts — when accounts are properly secured by customer (strong password, 2FA, withdrawal allowlist). Most exchange-related losses are customer-side compromise (phishing, credential reuse, SIM swap), not exchange compromise. Non-custodial holdings have different threat model but no exchange-side counterparty risk.
In Ethereum and similar smart-contract chains, you grant smart contracts permission to spend specific token amounts on your behalf. Typically required for DeFi interactions — the protocol contract needs approval to spend your tokens. Many users approve unlimited amounts for convenience, leaving ongoing exposure. Periodic audit and revocation of approvals is good practice. Tools like Revoke.cash help.
Download from official source (official website typed directly, not via search). Verify checksums where provided. Verify app store listing matches (correct developer name, expected functionality). Major wallets (MetaMask, Phantom, Trust Wallet, Ledger Live, Trezor Suite) all have well-known official sources; impersonating apps periodically slip into app stores. Due diligence matters.
Multi-signature wallets require multiple keys (typically 2-of-3 or 3-of-5) to authorise transactions. Even compromise of one key does not lead to fund loss. Operationally more complex; key holders must coordinate. Appropriate for substantial holdings or organisational treasuries. Probably overkill for typical individual users with modest holdings; appropriate for users with significant assets.
Yes. Crypto-related theft has spilled into physical-world attacks against known holders. Discretion about specific holdings, especially identifying details that connect online identity to real-world identity, reduces targeting. The crypto culture sometimes encourages public discussion; the security risk justifies resisting this regardless of cultural pressure.