April 2022
Browser extension wallets are only as strong as the underlying Operating System and security practices of the user. Software wallets across the entire crypto community can be and are compromised through various technological and social means; the Harmony Chrome extension wallet is no exception. Control of your funds means control of your private key - this means using a hardware wallet, removing unsupported wallets from your computer, and using high complexity passwords, especially if you cannot purchase a hardware wallet.
<aside> ⚠️ Critical Message: The Harmony Chrome Extension wallet will be unlisted starting May 2nd, 2022. In addition, the community has recently observed an uptick in wallet compromises. If your funds have been stored in this Chrome Extension wallet, please transfer your assets to a new wallet such as a Ledger Nano or MetaMask as soon as possible. We strongly recommend using a brand new account without reusing your existing private key for maximum security and peace of mind.
</aside>
With the ever-increasing headlines of today's financial crisis around the world, many have turned to cryptocurrency as an alternate avenue to finance. However, with all new and innovative tech comes unintended caveats and weaknesses. In the case of cryptocurrency, it is security. This is not to say that the technology of blockchain itself is not secure, but instead, it is the ability for individuals to keep themselves safe from bad actors. As a result, we’ve witnessed a slew of crypto hacks, or otherwise vulnerabilities, that lead to compromises of individual and community wallets across the entire cryptocurrency space.
To help educate the community, this article aims to provide some understanding of where these vulnerabilities lie and how better to protect yourself against them.
<aside> 💡 For a more comprehensive list, see: REKT Database | DEFIYIELD
</aside>
Hacked wallets and stolen crypto assets are unfortunately prevalent in this sector. The cryptocurrency community has seen report after report of stolen assets from various wallets, primarily through browser extension wallets. Offenders use a variety of methods to compromise a wallet and illegally access your tokens.
From clipboard hacks and a number of other types of malware, to social engineering, phishing and spoofing; browser extensions are only as strong as your computer’s security, and your wallet (regardless of its location) is only as strong as a person’s security practices.
Whether you’re storing your crypto assets on Metamask or the now deprecated Harmony Chrome extension wallet, your funds and private key are always vulnerable to software and social exploits.
https://www.reddit.com/r/ethereum/comments/se017w/lost_17000_of_eth_due_to_hacked_metamask_walle
https://www.shellypalmer.com/2021/12/my-metamask-eth-wallet-was-hacked/
https://www.reddit.com/r/Metamask/comments/pjbelm/wallet_got_hacked_emptied_unsure_how_nft_please/
https://t4techblog.com/got-hacked-on-metamask-these-could-be-reasons/