Am I dumb or something? Since attackers needs to exploit the BTC wallet interface why are we not asking ourselves how this will be carried out? Isn't the access needs to be granted somehow by the wallet owner? How can someone or a hacker have the ability to mimic your wallet interface?
Let's say I am using trust wallet now and I had to copy the last address I sent BTC to, the only way this can be possible is if.....
Clipboard malware is active, maybe while copy pasting the clipboard hijack malware switch the copied address to another.
Or some form of permission is been asked by the attacker, after you as the wallet owner clicked on a link, can someone please explain this to me or something.