Bitcoin Forum
December 23, 2025, 06:22:03 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Phishing attacks through downloading of cracked version apps  (Read 91 times)
Rgram (OP)
Full Member
***
Offline Offline

Activity: 238
Merit: 245



View Profile
June 26, 2025, 08:37:48 PM
Merited by CryptopreneurBrainboss (2)
 #1

Phishing can happen to anyone

Many of us today know what phishing is but, we many at times don’t give it much attention. Somehow, we always live under the impression that, it can’t happen to us because, we are well aware or well informed.
Well, if this was the case, we wouldn’t have seen many scammers trying us out on various schemes.

Recently, I have a friend that was phished to the point that, it’s okay for me to say his device was owned by this scammer. I felt sorry for him but, their was little that can be done to help this fellow. Once you give this guys a way in, they do all they can to get you out and take over completely. All chances of recovery would prove abortive. How did this happen?

So this friend of mine wanted to download the cracked version of an app to escape having to pay for subscriptions and use the app freely. After visiting the site to do the download and installation, he went ahead to launch the app, set permission to allow app to make changes to his device and that’s where it all went sideways. The device went blank completely, all efforts to restart the device wasn’t function. This happened in the evening and so, my friend didn’t have much choice than to wait it out till morning with hopes that, it was a normal device malfunction but then, this provided the hacker the time needed to take signature over certain financial related authorizations.

What did this hacker do?
The hacker actually installed a malware through the cracked version app to allow a one way mirror cast of his device. How were they able to archive this, I hope the hacker or a hacker here can share that insight.
This is how the hacker got hold of vital informations and details to reset this users informations completely.

Email address was swapped to a new one and even deleted a recovery email to update it with theirs.

Phone number was swapped (this user used one of those apps that generates phone numbers so, he didn’t really have the details of the number and the hacker still went ahead to get it off to update a new number).

Hacker proceeded to his KYC verified exchange and changed his login details while, KYC remained in place. Looked out for one of these online fintech institutions that required little to no details to open to create an account using my friends name.
Updated it on the exchange as payment media so flags wouldn’t be raised due to same name and then, proceeded to withdraw $1000.

All these was without the knowledge of my friend and he only got notifications of these changes the next day after his device finally came up. All efforts to rectify what has been done proves abortive.

He was advised to email Gmail on account reset but for that to be done, you need to mail Gmail from your original mail address of which, the hacker already changed and updated his details so that couldn’t work. Phone number was also changed and that’s how that option was off the table.

Next, he had to contact support of the exchange, using his KYC documents as a means to verify identity and request for freezing of KYC linked account after stating his case. That’s where he got some success.

Even then, vital credentials, funds and identity informations saved on the device has already been stolen.

What was done wrong?
Using phone number generated by apps in financial procedure registrations.

Downloading applications from an unknown source.

Downloading unknown applications to a device you work with.

Lessons to be learnt:
Avoid downloading applications from an unknown source.

Do not download unverified applications on the same device you work with.

Use details that are completely within your authorization in financial registrations.

When you are not ready to pay subscription charges for an app, it’s best to leave it alone than looking for cracked alternatives.

Summary
Let’s take security of our devices seriously as, the cost might end up being more expensive than the small fee we avoid to pay. When it comes to decentralized finance and having our funds on the web, security and self awareness is all we’ve got to it’s safety.

Davidvictorson
Hero Member
*****
Offline Offline

Activity: 1568
Merit: 953



View Profile
June 26, 2025, 10:23:37 PM
 #2

There's so many of this issues that happens to different people and is being reported here. Right now you don't need to even read a book to know how to avoid falling a victim. You just know it like the back of your palms due to the exposure to this knowledge.

The most important is - download apps from the original and authentic website. There are many ways to know the original from the fake. If you are not sure about it, ask questions. In my country we say a person who asks questions can not go missing likewise your chances of getting hacked is reduced when you ask questions if you are unsure about website or suspicious about a link.

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
Catenaccio
Sr. Member
****
Offline Offline

Activity: 980
Merit: 314



View Profile
June 27, 2025, 05:45:51 AM
 #3

If you are a Bitcoin user or cryptocurrency user, you must be very carefully with your practice on your devices both offline and online. Using cracked softwares is a very dangerous practice by installing a cracked patch that help your to crack and get a license key while it simultaneously contains risk of infectious threats on your devices.

Try to reduce and control your demand, then you will have better practice by less regularly install softwares especially cracked ones. It is kind of security-wise practice that can help keeping devices clean and immuned from digital threats which not only infect your devices, but also steal your accounts, wallets and funds.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT|
4,000+ GAMES
███████████████████
██████████▀▄▀▀▀████
████████▀▄▀██░░░███
██████▀▄███▄▀█▄▄▄██
███▀▀▀▀▀▀█▀▀▀▀▀▀███
██░░░░░░░░█░░░░░░██
██▄░░░░░░░█░░░░░▄██
███▄░░░░▄█▄▄▄▄▄████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
█████████
▀████████
░░▀██████
░░░░▀████
░░░░░░███
▄░░░░░███
▀█▄▄▄████
░░▀▀█████
▀▀▀▀▀▀▀▀▀
█████████
░░░▀▀████
██▄▄▀░███
█░░█▄░░██
░████▀▀██
█░░█▀░░██
██▀▀▄░███
░░░▄▄████
▀▀▀▀▀▀▀▀▀
|||
▄▄████▄▄
▀█▀
▄▀▀▄▀█▀
▄░░▄█░██░█▄░░▄
█░▄█░▀█▄▄█▀░█▄░█
▀▄░███▄▄▄▄███░▄▀
▀▀█░░░▄▄▄▄░░░█▀▀
░░██████░░█
█░░░░▀▀░░░░█
▀▄▀▄▀▄▀▄▀▄
▄░█████▀▀█████░▄
▄███████░██░███████▄
▀▀██████▄▄██████▀▀
▀▀████████▀▀
.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
░▀▄░▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄░▄▀
███▀▄▀█████████████████▀▄▀
█████▀▄░▄▄▄▄▄███░▄▄▄▄▄▄▀
███████▀▄▀██████░█▄▄▄▄▄▄▄▄
█████████▀▄▄░███▄▄▄▄▄▄░▄▀
███████████░███████▀▄▀
███████████░██▀▄▄▄▄▀
███████████░▀▄▀
████████████▄▀
███████████
▄▄███████▄▄
▄████▀▀▀▀▀▀▀████▄
▄███▀▄▄███████▄▄▀███▄
▄██▀▄█▀▀▀█████▀▀▀█▄▀██▄
▄██▀▄███░░░▀████░███▄▀██▄
███░████░░░░░▀██░████░███
███░████░█▄░░░░▀░████░███
███░████░███▄░░░░████░███
▀██▄▀███░█████▄░░███▀▄██▀
▀██▄▀█▄▄▄██████▄██▀▄██▀
▀███▄▀▀███████▀▀▄███▀
▀████▄▄▄▄▄▄▄████▀
▀▀███████▀▀
OFFICIAL PARTNERSHIP
SOUTHAMPTON FC
FAZE CLAN
SSC NAPOLI
Outhue
Hero Member
*****
Offline Offline

Activity: 1414
Merit: 625



View Profile WWW
June 27, 2025, 06:33:24 AM
 #4

I am not completely satisfied with your points because it seem incomplete to me, the main strategy that hacker use with apps and software is cracked versions available through torrent downloading websites or search engines.

I have completely formatted my laptop because of this, buying softwares can be hard at times due to overpriced and torrent do stand as an option that works too but very risky, I've been able to avoid paying for softwares this way.

Even some are clean but hackers will download them and repacakage the software back with trojan or malwares, the fastest way to infect your PC with such attacks is torrenting.


▄▄█████████████████▄▄
▄█████████████████████▄
███▀▀█████▀▀░░▀▀███████

██▄░░▀▀░░▄▄██▄░░█████
█████░░░████████░░█████
████▌░▄░░█████▀░░██████
███▌░▐█▌░░▀▀▀▀░░▄██████
███░░▌██░░▄░░▄█████████
███▌░▀▄▀░░█▄░░█████████
████▄░░░▄███▄░░▀▀█▀▀███
██████████████▄▄░░░▄███
▀█████████████████████▀
▀▀█████████████████▀▀
..Rainbet.com..
CRYPTO CASINO & SPORTSBOOK
|
█▄█▄█▄███████▄█▄█▄█
███████████████████
███████████████████
███████████████████
█████▀█▀▀▄▄▄▀██████
█████▀▄▀████░██████
█████░██░█▀▄███████
████▄▀▀▄▄▀███████
█████████▄▀▄██
█████████████████
███████████████████
██████████████████
███████████████████
 
 $20,000 
WEEKLY RAFFLE
|



█████████
█████████ ██
▄▄█░▄░▄█▄░▄░█▄▄
▀██░▐█████▌░██▀
▄█▄░▀▀▀▀▀░▄█▄
▀▀▀█▄▄░▄▄█▀▀▀
▀█▀░▀█▀
10K
WEEKLY
RACE
100K
MONTHLY
RACE
|

██









█████
███████
███████
█▄
██████
████▄▄
█████████████▄
███████████████▄
░▄████████████████▄
▄██████████████████▄
███████████████▀████
██████████▀██████████
██████████████████
░█████████████████▀
░░▀███████████████▀
████▀▀███
███████▀▀
████████████████████   ██
 
..►PLAY...
 
████████   ██████████████
Charles-Tim
Legendary
*
Offline Offline

Activity: 2128
Merit: 6120


Leading Crypto Sports Betting & Casino Platform


View Profile
June 27, 2025, 03:02:23 PM
 #5

I am not completely satisfied with your points because it seem incomplete to me, the main strategy that hacker use with apps and software is cracked versions available through torrent downloading websites or search engines.
Torrent files are dangerous.

But according to this report, there are some malicious malware that make it to Playstore and App store. I can still remember a time there were many fake Electrum wallets on Playstore. We do post about them on this forum while also report them until we do not see them anymore. I have read of a woman that downloaded fake app on Playstore before and lost huge amount of money.

Also there are malware and other means hackers can take someone to a fake application store, mimicking those like Playstore but the apps there are just fake and malicious.

It is good to avoid downloading unnecessary apps. On the device I have my wallets, exchanges, bank apps and other sensitive apps, I do not use it to download anything like apps, files and others.

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!