Trezor Talks How Phishing Can Steal Your Crypto Fortune and How to Protect Yourself

2018-11-29 06:35

Phishing attacks have become increasingly sophisticated. Today, a growing number of crypto users are falling victims to phishing attacks.

The team at crypto wallet Trezor recently decided to investigate the issue. Trezor published the results of its study in a blog post. The results provide an interesting look into how today’s most advanced phishing attacks are being used to steal crypto fortunes around the world.

Phishing Attacks Rely on Human Judgement

First, it’s important to note that phishing attacks rely on human judgement and perception.

You might get an email from a crypto exchange you use claiming that your account has been compromised. You click the link to reset your password, then enter your username into the following form. Within seconds, your password has been extracted and you’re the victim of a phishing attack.

Making matters worse is that you may not even realize your mistake until it’s too late: you might assume there’s no problem until you check your crypto wallets months later.

Using these strategies, phishing attacks can steal your credit card numbers, Social Security Number, passwords, usernames, and other sensitive information you input online.

Phishing Attacks Can Target Virtually Device

Phishing attacks aren’t limited to computers or smartphones. Phishing attacks can occur against your internet browser or software wallet. Today, most crypto-focused phishing attacks target software wallets and internet browsers.

Trezor recommends (obviously) using its hardware wallet to limit the power of phishing attacks.

“Your Trezor device, however, stays offline and is isolated from these attempts to misdirect you.”

That’s why Trezor recommends trusting your device – not your software or internet-connected device.

Top 5 Techniques Used by Today’s Phishing Attacks

The Trezor blog post goes on to highlight the most common techniques used by today’s phishing attacks, including all of the following:

Impersonation Technique

Trezor describes this attack as “one of the fastest to carry out and technologically simplest to implement.” With the impersonation technique, the attacker impersonates someone else – like a sales rep, a customer service agent, a friend, or a boss. Under that assumed personality, the attacker tries to lure the victim into giving out sensitive information.

Sometimes, the impersonation technique involves a spoofed website, spoofed phone communication, or fake emails that appear to be from a legitimate organization.

Trezor claims some phishing attacks claim to be from Trezor. An attacker will impersonate a Trezor sales rep or customer service agent, for example, and demand information from the victim.

DNS Poisoning

A DNS poisoning phishing attack takes advantage of the Domain Name System (DNS) system, sending the visitor off in the wrong direction. It makes a site appear offline when in reality the website is perfectly fine. The attacker may redirect users to a server that the attacker controls.

The best way to avoid DNS poisoning is to look for an invalid SSL certificate. All legitimate websites (particularly crypto exchanges) have a valid SSL certificate.

BGP Hijacking

BGP hijacking works in a similar way to DNS poisoning. With BGP hijacking, an attacker takes control of a group of IP prefixes assigned to a potential victim.

Just like with DNS poisoning, BGP hijacking can be spotted by looking for invalid SSL certificates.

Unicode Domain Phishing

The Unicode domain phishing attack, or IDN homograph attack, relies on the fact that popular browsers show Unicode characters in domain names as ordinary characters.

Someone can therefore create a domain using a Unicode character that looks like a normal website. They could create Facebook.com where the second “o” is a Unicode character, for example. You don’t notice it until you’ve already typed in your Facebook username and password.

Cybersquatting

Cybersquatting is the practice of phishing attackers registering a domain name that they anticipate will be used in the future. Someone might register a domain name for NikeShoes.com, for example, even though they have no association with Nike.

In the crypto world, someone could register a domain that appears to be the legitimate domain for an exchange – say, BinanceExchange.com. You might confuse this with Binance.com.

The Best Tips for Avoiding Phishing Attacks in the Crypto World

Trezor followed up their blog post with an explanation of how to avoid phishing attacks inside and outside the crypto world. Here are some of Trezor’s recommendations:

Trust your device – not your software. Look for on-screen confirmation on the device, especially when making transactions or using your recovery seed. Make sure the URL for your cryptocurrency exchange or wallet provider exactly matches the official website. Consider bookmarking your most-used crypto websites to avoid any confusion. Never give your recovery seed to anyone, even someone who claims to be a tech support agent from the exchange or wallet provider. Use updated security software and install the latest security patches. Pay close attention to shortened links, particularly on social media. Shortened links can easily hide a malicious domain.

By following the tips above, you can avoid the vast majority of phishing attacks. Hold onto your cryptocurrency fortunes and avoid crypto phishing attacks today.

Similar to Notcoin - Blum - Airdrops In 2024

origin »

Emerald Crypto (EMD) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 4.67 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Цена в час новости $ 0.0046635 (-100%)

phishing crypto attacks trezor results today published

phishing crypto → Результатов: 30


Фото:

5 Crypto Phishing Scams to Be Aware Of

Crypto phishing scams are becoming one of the most profitable methods for cybercriminals to steal your cryptocurrency. Phishing for Crypto Cybercrime exists because it’s profitable. You might think the efforts of malicious actors are petty or trivial when you delete obvious scam emails from your inbox, but every so often, one of them works — and it makes money for the bad guys.

2019-4-6 14:00


Top 5 Crypto Crime Trends: Cryptojacking Malware, Botnets, Trojan Horses, Phishing and Sextortion

Cryptocurrency is no stranger to dubious tactics by those who are looking to cheat the system – and those who use it. Several digital security companies, such as Kaspersky Labs, have been trying to provide cryptocurrency users and services with the tools and resources they need to combat against the troublesome tactics. Here are just […]

2018-11-14 22:29


Myetherwallet Suffers More Attacks than Any Other Ethereum Wallet

MyEtherwallet has been known to be one of the Largest Ethereum wallets in the Crypto sphere and has major encounters and breach of security which puts users tokens at huge risks. Phishing Attacks have been on the rise with popular exchanges like binance,bittrex and bitfinex always getting cloned by impersonators and most time they still […] The post Myetherwallet Suffers More Attacks than Any Other Ethereum Wallet appeared first on ZyCrypto.

2018-9-17 16:31


Фото:

Kaspersky’s Report Claims $2.3 Million Stolen by Cryptocurrency Scammers in Q2 2018

A new report released by Kaspersky Labs claims that the mammoth amount of $2. 3 million was lost in crypto scams in the second quarter of this year, and cybercriminals are responsible for it. The Moscow-based antivirus and security firm further reveals in its report titled “Spam and Phishing in Q2 2018” that it was successful in […] Kaspersky’s Report Claims $2.

2018-8-18 15:19


Фото:

Top Crypto Exchanges Still Using Authenticator 2FA Despite Google Dropping Support

Google has had none of its 85,000+ employees successfully phished since early 2017 when it was reported they dropped the use of its own Authenticator app and switched to a U2F model.  [Note: This is a guest article submitted by Marco Paez] All Top Crypto Exchanges Currently Use Google Authenticator The move was necessary as recent data released by the APWG reported that phishing attacks have tripled since 2013, with over 246 million user attempts being made Read More The post Top Crypto Exchanges Still Using Authenticator 2FA Despite Google Dropping Support appeared first on Bitcoinist.com.

2018-8-5 23:00


EtherScamDB: Ethereum (ETH) Scam Database For Active Threats?

The continued rise of cryptocurrency popularity has created a breeding ground for malicious attacks, phishing attempts, and the occasional PC hacks. While a large popularity of crypto users is earning from their efforts, there is another group that has chosen to earn a living by stealing from the hard workers. What Is EtherScamDB? EtherScamDB was […]

2018-7-15 14:09


Reports have confirmed that Japan has been targeted by cybercriminals using phishing, or illegal acquisition of personal information, to steal

Fake emails sent in Japanese language reportedly rose to at least 1,500 by last autumn. Fake emails in Japanese language sent to steal private information were confirmed last November A report published by the University of Tsukuba and Nomura Asset Management, an investment management company, criticized six government approved crypto exchanges saying they were operating

2018-7-2 18:13


Action Fraud Warning: High Incidence Of Prowling Wannacry Ransomware, Phishing, Targeting Crypto users

Action Fraud, UK’s cyber crime watchdog has warned cryptocurrency users to be watchful of phishing emails which use Ransomware WannaCry. Issuing the red alert, the regulator said, “The WannaCry emails are designed to cause panic and trick you into believing that your computer is infected with WannaCry Ransomware,” and users have to be careful not […] The post Action Fraud Warning: High Incidence Of Prowling Wannacry Ransomware, Phishing, Targeting Crypto users appeared first on ZyCrypto.

2018-6-26 19:58