Page a Table of Contents INTRODUCTION ........................................................................................................................... 1 How Digital Wallets Work ................................................................................................................................... 1 Methodology....................................................................................................................................................... 3 What we analyzed............................................................................................................................................... 3 KEY FINDINGS .............................................................................................................................. 4 DIGITAL WALLETS IN THE CYBER UNDERGROUND ......................................................................... 5 Methods and tutorials ........................................................................................................................................ 5 Sale of Vulnerabilities ......................................................................................................................................... 7 Verifying account ................................................................................................................................................ 8 Phishing ............................................................................................................................................................... 8 CONCLUSIONS ........................................................................................................................... 10