[ad_1]
Blockchain security firm SlowMist has highlighted five common phishing techniques used by cryptocurrency scammers against victims in 2022. This includes malicious browser bookmarks, fake sales orders, and trojan malware spread across his Discord messaging app.
According to SlowMist’s Jan. 9 report, security firms recorded a total of 303 blockchain security incidents over the year, with 31.6% of these incidents attributed to phishing, lag pulls, or other fraud. .
Malicious browser bookmarks
One phishing strategy relies on bookmark managers, a feature of most modern browsers.
SlowMist says scammers are using these to ultimately gain access to project owners’ Discord accounts.
“By injecting JavaScript code into bookmarks via these phishing pages, attackers can access Discord users’ information and potentially hijack the privileges of project owners’ accounts,” the company wrote.
After luring the victim into adding a malicious bookmark via a phishing page, the crooks wait until the victim clicks on the bookmark while logged into Discord. This triggers an embedded JavaScript code that sends the victim’s personal information to the scammer’s girlfriend’s Discord channel.
During this process, the scammer steals the victim’s Discord token (an encrypted Discord username and password), gains access to the account, and posts fake messages and links to phishing scams impersonating the victim. can do.
“Zero Dollar Buy” NFT Phishing
According to SlowMist, 22 of the 56 major NFT security breaches were due to phishing attacks.
One of the most common methods used by scammers is to trick victims into signing NFTs virtually for free via fake sales orders.
Once the victim has signed the order, the scammer can purchase the user’s NFT at a price of their choosing through the marketplace.
“Unfortunately, signatures stolen through sites like Revoke cannot be deauthenticated,” writes SlowMist.
“However, you can unapprove previous pending orders that you have set. This reduces the risk of phishing attacks and prevents attackers from using your signature.”
Currency theft by Trojan horse
According to SlowMist, this type of attack typically occurs through private Discord messages, where the attacker invites the victim to join them in testing a new project, and distributes it in the form of a compressed file containing an executable file of approximately 800 MB. to send the program.
After downloading the program, it scans for files containing key phrases such as “wallet” and uploads them to the attacker’s server.
“The latest version of RedLine Stealer also has the ability to steal cryptocurrencies, scanning the information of digital currency wallets installed on your local computer and uploading it to the remote control machine,” said SlowMist. .
“RedLine Stealer can not only steal cryptocurrencies, but also upload and download files, execute commands, and send periodic information about infected computers.”
“blank check” eth_sign phishing
This phishing attack allows scammers to use your private key to sign transactions of their choice. there is.
After signing, an attacker has access to your signature and can create arbitrary data and ask you to sign it via eth_sign.
“This kind of phishing can be very confusing, especially when it comes to authentication,” the company said.
Enclosed number transfer fraud
In this scam, attackers airdrop small amounts of tokens (such as .01 USDT or 0.001 USDT) to victims with similar addresses except for the last few digits. The goal is to trick the user into accidentally copying the wrong address into their transfer history.
The rest of the 2022 report covered other blockchain security incidents over the year, including contract vulnerabilities and private key compromises.
Related: DeFi-type projects hit the most attacks in 2022: report
This year, there were about 92 attacks that exploited contract vulnerabilities, resulting in a total loss of about $1.1 billion due to smart contract design flaws and program hacks.
Meanwhile, private key theft accounted for about 6.6% of attacks and cost at least $762 million. The most prominent examples are the Ronin Bridge and Harmony’s Horizon Bridge hack.
[ad_2]
Source link