Frame-2085666935

Blind Spot Audit

Secure fraud your IDV already approved.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Deepfake Detection

Check where deepfake IDs slipped
through your stack.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Liveness Detection

Find the replay gaps in your passed
liveness checks.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Deepfake Detection

Spot synthetic documents hiding in
verified users.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

Frame-2085666935

Document Originality Detection

Stop fake documents before they pass.

Runs On Your CloudRuns On Your Cloud

No Data SharingNo Data Sharing

No Contract RequiredNo Contract Required

.

Introducing Blind Spot Audit. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

Introducing Blind Spot Audit Teg-1

Spot AI-generated forgeries with advanced document analysis.

Run Now right-arrow-2
  • .

    Introducing Deepfake Detetction. Detect deepfakes with precision your stack has missed. Teg-1 Run Now on AWS right-arrow-2

    Introducing Deepfake DetetctionTeg-1

    Detect deepfakes with precision your stack has missed.

    Run Now right-arrow-2
  • .

    Introducing Liveness Detection. Detect spoofs with technology built for sophisticated fraud. Teg-1 Run Now on AWS right-arrow-2

    Introducing Liveness DetectionTeg-1

    Detect spoofs with technology built for sophisticated fraud.

    Run Now right-arrow-2
  • .

    Introducing Document Deepfake Detection. Spot AI-generated forgeries with advanced document analysis. Teg-1 Run Now on AWS right-arrow-2

    Introducing Document Deepfake DetectionTeg-1

    Spot AI-generated forgeries with advanced document analysis.

    Run Now right-arrow-2
  • .

    Introducing Document Originality Detection. Verify document authenticity before your next audit. Teg-1 Run Now on AWS right-arrow-2

    Introducing Document Originality DetectionTeg-1

    Verify document authenticity before your next audit.

    Run Now right-arrow-2
  • us

    216.73.216.154

    Hacker attempts to steal crypto via fake Google Chrome extensions

    Hacker

    A hacker is exploiting trust in renowned brands by creating fake cryptocurrency wallet extensions for Google Chrome that deceive victims into revealing sensitive information. The Director of security at wallet provider MyCrypto, Harry Denley, who detected the fake wallet extensions, stated that Google had removed 49 extensions from its Web Store till now that were claiming to be well-known crypto wallets.

    The fake extensions are basically scamming ploys. Posing as legitimate wallets, they provide personal information added by users, like private keys and passwords, to the hacker, who can then steal funds within a few seconds.

    The fakes detected have thus far claimed to be wallets including Ledger, Trezor, Jaxx, Electrum, MyEtherWallet, MetaMask, Exodus, and KeepKey. Test amounts of crypto sent by Denley haven’t been received, indicating that either the hacker has to empty wallets manually or they’re only curious about comparatively large balances.

    Denley noted that on the Chrome Web Store, most of these apps had good reviews written typically in simplistic or broken English. On the basis that the admin email appears to be a Russian one, it’s possible the hacker could also be based there.

    Over half of the malicious attempts reported are attributed to hardware wallet maker Ledger which is almost double to MyEtherWallet which was 22% of fake attempts and stands at the 2nd highest. Denley reported that there are no clear indicators as to why hackers in such a large number are attempting on the Ledger.

    When inquired about the ways to stop hackers from creating new fake extensions, Denley’s response to told CoinDesk was: “Not really, though Google could use the data from the 49 extensions we’ve flagged to build some detection – though it could be easily bypassed.

    Most of the malicious extensions had the same structure and same files which could be analyzed,”. He further added, “The only way I can think of limiting the victim pool is by education and normalizing the behavior of not entering raw secrets into [user interfaces].

    Denley has displayed his concern over serious security threats faced by cryptocurrency wallets. Previously he raised his concern over the security of wallets as the same private key was issued to multiple users.

    Denley identified fake wallets in February 2020, ever since then, the reported number of phishing attempts have increased exponentially on a monthly basis. Since the hackers are successful in concealing identity while creating fake wallet extension ad infinitum, therefore the incidence of fake attempts is more likely to increase.

    Related Posts

    News

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Explore More

    News

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Explore More

    News

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    Explore More

    News

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Explore More

    News

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Explore More

    News

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Explore More

    News

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Explore More

    News

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Meta Blocks 544,000+ Accounts Under Australia’s Social Media Ban

    Explore More

    News

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Ireland Calls for Compulsory ID Verification on Social Platforms Across the EU

    Explore More

    News

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    France Targets Under-15 Social Media Use With Mandatory Age Verification For 2026

    Explore More

    News

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Malaysia Aims for 95% Public Service Integration With MyDigital ID By 2030

    Explore More

    News

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Germany’s eID Under Scrutiny as EU Digital Identity Wallet Deadline Nears

    Explore More

    News

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Federal Judge Blocks Louisiana Social Media Age Verification Law Ahead of Enforcement

    Explore More

    News

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Department of Education Says New ID Checks Blocked $1B in Student Aid Fraud Linked to “Ghost Students”

    Explore More

    Take the next steps to better security.

    Contact us

    Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

    Contact us

    Request demo

    Get free access to our platform and try our products today.

    Get started
    Shufti-tick

    Thanks For Your Submission.

      close-form

      Run Document Deepfake on AWS

      Stop synthetic IDs and forged scans

      Enter your work email*