Hamster Kombat players fall victim to sophisticated phishing attacks through fake airdrops

Hamster Kombat players fall victim to sophisticated phishing attacks through fake airdrops
фото показано с : invezz.com

2024-7-19 15:08

In a troubling development, players of the rapidly growing Telegram-based clicker game, Hamster Kombat, have fallen victim to a series of sophisticated phishing attacks through fake airdrops. This new wave of cybercrime highlights the increasing threats faced by digital gaming communities.

Hamster Kombat has seen an impressive growth trajectory, amassing 239 million users in just 81 days. 

However, this popularity has also made it a target for cybercriminals. The game’s surge in user base coincides with a major IT outage affecting business systems worldwide, making the timing particularly concerning for cybersecurity experts.

Fake Hamster Kombat (HMSTR) airdrops

The rapid expansion of digital gaming and cryptocurrency has led to Hamster Kombat attracting new users at a rate of 4-5 million daily. The game’s native token, HMSTR, has also gained significant interest following its listing on Bybit for pre-market trading on July 8.

Unfortunately, this surge in popularity has drawn the attention of scammers.

These cybercriminals are creating fake airdrops of the game’s virtual currency, aiming to lure users into providing their crypto wallet credentials by promising free Hamster Kombat tokens.

Additionally, scammers have set up phishing sites falsely claiming to sell Hamster cryptocurrency at discounted rates, further deceiving users and gaining access to their digital assets.

Kaspersky uncovers fraudulent schemes

Olga Svistunova, a security expert at Kaspersky, revealed to Cointelegraph that one of the most prevalent tactics used by scammers involves phishing links promising to convert in-game coins to rubles.

These links require users to enter their Telegram login credentials, which are then stolen by the attackers.

Once scammers gain access to users’ credentials, they can hijack personal accounts, leading to potential data theft, blackmail, and the dissemination of fraudulent messages.

While this scheme primarily targets players in Russia, Svistunova cautioned that fraudsters from other regions might soon adopt similar tactics to deceive victims globally.

A recent Kaspersky report also highlights the creation of fake websites offering free coins or fraudulent commission payments, designed to steal users’ cryptocurrency.

This surge in phishing attacks and crypto theft underscores a broader issue within the cryptocurrency industry. Over the past 13 years, nearly $19 billion worth of digital assets have been stolen across 785 reported hacks and exploits.

The rise in phishing attacks, particularly on newer blockchain platforms, exacerbates the problem. For instance, phishing attacks on the Base blockchain saw a staggering 1,900% increase in March compared to January, leading to a dramatic 18-fold rise in stolen cryptocurrency.

The popularity of Hamster Kombat has unfortunately made it a prime target for sophisticated phishing attacks. Players must remain vigilant and cautious, especially when dealing with offers that seem too good to be true. As cybercriminals continue to exploit the digital gaming and cryptocurrency boom, staying informed and adopting robust security measures is crucial to safeguarding personal and financial information.

The post Hamster Kombat players fall victim to sophisticated phishing attacks through fake airdrops appeared first on Invezz

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Hamster Marketplace Token (HMT) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 0.00 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 0 HMT

fake attacks airdrops phishing hamster through players

fake attacks → Результатов: 28


Фото:

Hacker Group Lazarus Uses Fake Exchanges, Telegram Groups in Latest Malware Attacks

A new report shows that North Korea-linked Lazarus Group has adapted and evolved new techniques since initial attacks, and are using phony trading platforms linking to Telegram channels which distribute malware, as well as making their malware more stealthy by “adding an authentication mechanism in the macOS,” amongst other tactics.

2020-1-11 09:39


In-person meatspace protocol to prove unconditional possession of a private key

Recommended pre-reading: https://ethresear. ch/t/minimal-anti-collusion-infrastructure/5413 Alice slowly walks down the old, dusty stairs of the building into the basement. She thinks wistfully of the old days, when quadratic-voting in the World Collective Market was a much simpler process of linking her public key to a twitter account and opening up metamask to start firing off votes.

2019-10-2 04:03


Sidechains vs Plasma vs Sharding

Special thanks to Jinglan Wang for review and feedback One question that often comes up is: how exactly is sharding different from sidechains or Plasma? All three architectures seem to involve a hub-and-spoke architecture with a central “main chain” that serves as the consensus backbone of the system, and a set of “child” chains containing actual user-level transactions.

2019-6-14 04:03


Binance CEO CZ attacks exchanges with fake trading volume; claims ‘credibility’ is most important

The issue of fake data in the cryptocurrency space has been prevalent for a long time now and many proponents and luminaries in the space are trying hard to combat it. Bitcoin [BTC], the largest cryptocurrency in the space, has been at the center of many controversies involving fake trading volumes and exchanges manipulating the […] The post Binance CEO CZ attacks exchanges with fake trading volume; claims ‘credibility’ is most important appeared first on AMBCrypto.

2019-4-6 17:30


On Collusion

Special thanks to Glen Weyl, Phil Daian and Jinglan Wang for review Over the last few years there has been an increasing interest in using deliberately engineered economic incentives and mechanism design to align behavior of participants in various contexts.

2019-4-5 04:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency.

2018-7-21 23:03