In a scenario where a phishing attack directs a user to a decoy site in order to convince them to download a file containing malware, the implementation complexity increases. This is explained by the need to bypass the user's antivirus programs and firewalls. Unfortunately, many users either do not use an antivirus at all, or set the firewall to the minimum level of protection, which plays into the hands of scammers. Adding to the risk is the habit of some users to download content from unreliable sources, such as torrents, which may contain hidden malware.
One particularly dangerous form of malware are so-called clippers. These programs work in an extremely clever way: when you copy a cryptocurrency address from the messenger to make a transaction, the clipper quietly replaces it with the scammer’s address in the clipboard. As a result, when you paste the address into the recipient field, you are unknowingly sending your funds not to the intended address, but straight to the scammer.