Encrypted messaging site Privnote cloned to steal Bitcoin
Criminals aim to redirect users’ Bitcoins using a phishing scam

Journalist Brain Krebs recently warned Privnote users about a phishing scam that lures victims to a fake website, privnotes.com.
Rather than fully encrypting messages, the fake site enables others to read and/or modify users’ messages. The cloned site also contains a script that finds messages with Bitcoin addresses and allows the hacker to replace the sender’s address with their own. Any Bitcoin funds sent by the original user would go to the modified address instead.
“Any messages containing bitcoin addresses will be automatically altered to include a different Bitcoin address, as long as the Internet addresses of the sender and receiver of the message are not the same,” said Krebs.
“Until recently, I couldn’t quite work out what Privnotes was up to, but today it became crystal clear.”
The owners of the legitimate website privnote.com notified Krebs someone built the clone website to trick its users. The two websites are similar in name and appearance, and privnotes.com comes second in a Google search of “privnote.” Typing “privnotes” will bring up the fake website first in a Google search.
Since Privnote messages self-destruct after they are sent and read, victims of the scam cannot go back to check the Bitcoin messages when they are altered. According to Allison Nixon, chief research officer at Unit 221B, the script seems to change just the first appearance of the Bitcoin address when it’s repeated in the email.
“The type of people using privnote aren’t the type of people who are going to send that bitcoin wallet any other way for verification purposes,” Nixon said. “It’s a pretty smart scam.”
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Bitcoin scams have been increasing in frequency over the last few months. Many are tied to the coronavirus pandemic.
David Gargaro has been providing content writing and copy editing services for more than 20 years. He has worked with companies across numerous industries, including (but not limited to) advertising, publishing, marketing, real estate, finance, insurance, law, automotive, construction, human resources, restoration services, and manufacturing. He has also managed a team of freelancers as the managing editor of a small publishing company.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Liquid cryptocurrency exchange loses $97 million after hack
News Amount lost includes $45 million in Ethereum tokens
By Rene Millman Published
-
False crypto-mining apps plague Google Play
News Apps deceive users into clicking on ads or buying non-existent mining subscriptions
By Rene Millman Published
-
Ohio resident pleads guilty to running Bitcoin “mixer” money laundering scheme
News More than $300 million went through Darknet-based bitcoin hashing (BTC) service
By Rene Millman Published
-
Study: Cryptocurrency value spikes encourage more illicit mining
News Researchers tracked Modero cryptocurrency and illicit mining for nearly three years
By Rene Millman Published
-
Crypto-mining hackers hit Kubernetes clusters
News New campaign abused Kubeflow dashboards to install malicious containers
By Rene Millman Published
-
FTC warns of rising cryptocurrency fraud
News Marked rise in cryptocurrency losses began just as pandemic took hold
By Danny Bradbury Published
-
US identifies and charges SamSam ransomware authors
News In a wave of attacks spanning three years, the US government has charged the people behind it, but getting them in handcuffs won't be easy
By Connor Jones Published
-
Hackers are increasingly exploiting cryptojacking malware without needing active browsers
News Crypto malware is quickly extending to non-browser applications, says Checkpoint
By Nicholas Fearn Published