TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attackers get remote desktop access and can run code that drains crypto wallets. Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders. Experts call for clearer Microsoft Teams warnings to stop [...] The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.TLDR: Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams. Once granted, attackers get remote desktop access and can run code that drains crypto wallets. Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders. Experts call for clearer Microsoft Teams warnings to stop [...] The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.

Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know

2025/09/13 16:42

TLDR:

  • Hackers trick users with fake podcast invites before requesting screen control through Microsoft Teams.
  • Once granted, attackers get remote desktop access and can run code that drains crypto wallets.
  • Security researcher Nick Bax says millions are already gone, hitting both project leaders and regular holders.
  • Experts call for clearer Microsoft Teams warnings to stop more crypto users from falling victim.

Hackers have found a new way to clean out crypto wallets, and it’s catching people off guard. The method is simple, built on trust, and ends with stolen funds. 

Security researcher Nick Bax shared details of the attack, warning that millions are already gone. Both project founders and everyday investors have been hit. This is a growing problem for the crypto community, and it relies on social engineering more than tech.

Bax explained that hackers are using Microsoft Teams calls to take full control of victims’ desktops. They first gain access to a real Twitter or Telegram account, or create a convincing fake. Then they contact their target with an offer: usually a podcast interview, partnership call, or investor chat.

The conversation continues until the hacker asks the victim to screen-share their project. After some time, they claim they need to share something too. That’s when a request appears asking for “control” of the screen. Most users think this is harmless and click accept.

Once accepted, the hacker has remote control of the computer. Bax warned that they can now run commands, install malware, and empty wallets. This is not a technical exploit but a social one, and it works.

Crypto Security Risks Widen

According to Bax, this attack is harder to spot on Microsoft Teams because of how the dialog is worded. The message says “Requesting control,” which sounds routine. On other platforms like Zoom, there are extra warning clicks before control is handed over. This difference makes Teams a softer target.

Bax even tested creating a fake Teams account using Cyrillic characters to mimic “Microsoft Teams.” He said the platform allowed it, making it easier for attackers to trick victims. The result is a mix of bad UX design and patient social engineering.

This attack has been active for months and keeps evolving. The initial hook may change, but the result is the same: a complete desktop takeover. Crypto investors and project leaders are urged to treat all screen control requests as high-risk.

Security experts say users should verify who they are speaking to before any screen share. Turning off screen control permissions unless absolutely needed can also prevent attacks. Bax called on Microsoft to add clearer warnings so users understand what they are agreeing to before control is granted.

The post Hackers Use Microsoft Teams to Hijack Crypto Wallets: What To Know appeared first on Blockonomi.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Best Cranberry-Orange Nut Bread (and It Doesn’t Need A Glaze)

The Best Cranberry-Orange Nut Bread (and It Doesn’t Need A Glaze)

The post The Best Cranberry-Orange Nut Bread (and It Doesn’t Need A Glaze) appeared on BitcoinEthereumNews.com. This festive colorful loaf of cranberry, orange and pecans will delight your friends and family either at home or as a gift. Elizabeth Karmel This time of year, cranberry and orange go together like peanut butter and jelly. It is a classic combination so perfect, it’s practically its own flavor. I’ve always loved the bright, tart combination of cranberry and orange, but most of the cranberry-orange loaves (I’ve tried) miss the mark. Too often, they’re dry and one-dimensional, relying on a sugary glaze for flavor. Last year, I decided to see if I could fix that. I set out to create a version of this popular loaf that would be moist and tender with bursts of tangy cranberry tempered by just enough sweetness and fragrant citrus—and delicious enough to stand on its own without a glaze. I experimented with chopping the cranberries, but ultimately preferred leaving them whole. I love the look of pockets of bright red from whole cranberries and the sharp burst of tart flavor. The liquid in the recipe is mostly fresh-squeezed orange juice. I top off the fresh juice with half and half to soften the acidity, and add a little extra moisture to the crumb. For extra citrus flavor, the zest of those same oranges is rubbed into the sugar to maximize the fragrant oil (from the zest). I often use clementines or mandarins when they are in season because I find them to be even more flavorful. The reverse creaming method calls for butter to be cut into the dry ingredients a.k.a. flour-sugar mixture until it is evenly disbursed and resembles fine sand. Elizabeth Karmel To insure that the loaf bakes tender and moist, I used the reverse creaming method—an easy, foolproof technique that’s less fuss than traditional creaming. Instead of beating butter and…
Share
BitcoinEthereumNews2025/11/18 19:40
Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

The post Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO appeared on BitcoinEthereumNews.com. Aave DAO is gearing up for a significant overhaul by shutting down over 50% of underperforming L2 instances. It is also restructuring its governance framework and deploying over $100 million to boost GHO. This could be a pivotal moment that propels Aave back to the forefront of on-chain lending or sparks unprecedented controversy within the DeFi community. Sponsored Sponsored ACI Proposes Shutting Down 50% of L2s The “State of the Union” report by the Aave Chan Initiative (ACI) paints a candid picture. After a turbulent period in the DeFi market and internal challenges, Aave (AAVE) now leads in key metrics: TVL, revenue, market share, and borrowing volume. Aave’s annual revenue of $130 million surpasses the combined cash reserves of its competitors. Tokenomics improvements and the AAVE token buyback program have also contributed to the ecosystem’s growth. Aave global metrics. Source: Aave However, the ACI’s report also highlights several pain points. First, regarding the Layer-2 (L2) strategy. While Aave’s L2 strategy was once a key driver of success, it is no longer fit for purpose. Over half of Aave’s instances on L2s and alt-L1s are not economically viable. Based on year-to-date data, over 86.6% of Aave’s revenue comes from the mainnet, indicating that everything else is a side quest. On this basis, ACI proposes closing underperforming networks. The DAO should invest in key networks with significant differentiators. Second, ACI is pushing for a complete overhaul of the “friendly fork” framework, as most have been unimpressive regarding TVL and revenue. In some cases, attackers have exploited them to Aave’s detriment, as seen with Spark. Sponsored Sponsored “The friendly fork model had a good intention but bad execution where the DAO was too friendly towards these forks, allowing the DAO only little upside,” the report states. Third, the instance model, once a smart…
Share
BitcoinEthereumNews2025/09/18 02:28