[ad_1]
The launch of an ICO (initial offer of coins) was for a moment considered a quick opportunity for investment enthusiasts in cryptomounts. The rhetoric is simple: buy today a virtual currency virtually launched with a value close to zero in the idea of selling later with profit.
The Cryptomonas phenomenon and the appearance of an interested public, consisting of their owners, could not go unnoticed by cyber criminals. The techniques generally used to achieve their goals are classic, phishing. However, these often go further than "normal" scenarios. Inspired by topics such as the launch of an ICO (initial offer of coins), investment and free distribution of cryptomonas, cyber criminals were able to take advantage of virtual coins and novice coins.
The most popular targets are those who are interested in ICO and who wish to invest in start-ups, in the hope of making profits in the future. For this group of people, cyber criminals create fake web pages that mimic OIC official project sites or attempt to access their network of contacts so that they can send phishing emails. with the number of an electronic wallet, for potential investors. The most successful attacks use highly known ICO projects. For example, by exploiting ICO for Switcheo, using a free cash distribution proposal, criminals stole the equivalent of more than $ 25,000 in cryptomones after spreading the link via a fake Twitter account [19659002] Another example is the creation of phishing sites for the OIC's OmaseGo project, which allowed crooks to earn more than $ 1.1 million in cryptomonads. The rumors related to the ICO for the Telegram have also attracted so much interest, which has led to the creation of hundreds of fake sites where "investments" could be made.
Another trend in cryptomonas is that of "gifts". The method is as follows: Victims are welcome to send a small amount of virtual coins in exchange for a much higher amount than they will receive in the future. The criminals even used the social media accounts of some well-known people, including Elon Musk and Telegram founder Paul Durrov. By creating fake accounts or answering some legitimate user tweets about these fake accounts, delinquents manage to confuse Twitter users so that they can click on fake accounts responses. "The results of our research show that cybercriminals are experts in updating and developing resources to achieve the desired results with phishing in cryptomonas," said Nadezhda Demidova, Senior Web Content Analyst, Kaspersky Lab. . "These nine methods of fraud are based on simple social engineering techniques, but they are different from them because they help criminals to earn millions of dollars.The success they've experienced shows that They have exploited the human factor, which has always been one of the weakest links in cybersecurity, to make money. "
To protect their virtual pieces, researchers Kaspersky Lab recommends that users follow a few simple rules:
- Remember that offers that seem too tempting to be true should be viewed with skepticism.
- Consult official sources for more information on free distribution of cryptomonas. For example, if you see information about the distribution of parts from the newly attacked Binance blockbill ecosystem, go to the official source and clarify this information.
- Look for third-party transactions related to the portfolio transaction to which you are trying to transfer your money. One way to do this is through blockchains such as etherscan.io or blockchain.info, allowing users to view detailed information about any virtual currency transaction and to identify if that portfolio can be dangerous. . 19659009] Always check the hyperlinks and data in the address bar of your browser. For example, it should be "blockchain.info", not "blockchaen.info".
- Save the e-wallet address in a tab and access it here – to avoid accidentally accessing a website According to estimates by Kaspersky Lab, offenders have managed to gain more than 21,000 RTH (Crypto-Moneda Ether, using the Ethereum platform blockbill) or more than $ 10 million at the current exchange rate using the tactics described above in the last year. This amount does not take into account "classic" phishing attacks or examples of individual address generation for each victim.
[ad_2]
Source link