Page a
Table of Contents
INTRODUCTION ........................................................................................................................... 1
How Digital Wallets Work ................................................................................................................................... 1
Methodology....................................................................................................................................................... 3
What we analyzed............................................................................................................................................... 3
KEY FINDINGS .............................................................................................................................. 4
DIGITAL WALLETS IN THE CYBER UNDERGROUND ......................................................................... 5
Methods and tutorials ........................................................................................................................................ 5
Sale of Vulnerabilities ......................................................................................................................................... 7
Verifying account ................................................................................................................................................ 8
Phishing ............................................................................................................................................................... 8
CONCLUSIONS ........................................................................................................................... 10