The crypto industry is full of promises of passive income, huge profits and scams. Just like the money in your bank account, crypto scammers want your digital currencies and will do anything they can to steal them.
In this article, we will introduce 5 cunning tricks that cryptocurrency scammers may use in 2023.
According to the Coin Gap site, Airdrop is one of the most common tricks. Companies usually distribute cryptocurrencies (or money) to users’ wallet addresses during certain activities, such as launching a new product, offering a new coin, or promoting a brand. Crypto phishing scammers create sophisticated clones of company profiles, websites, and emails they want to impersonate, trapping unsuspecting people. In July 2022, Uniswap, a popular decentralized exchange, lost nearly $8 million worth of Ethereum in a sophisticated phishing attack.
Browser malicious bookmark
eth_sign phishing trick
This cryptocurrency phishing scam allows a hacker to gain access to your private key and sign any transaction they choose. Once the wallet is connected to a fraudulent site, attackers gain access to your signature, allowing them to forge any data and ask you to sign it via eth_sign.
Whaling attacks are mostly directed at top executives. Although the main purpose of whaling is also a cryptographic phishing attack, the method used to perform this trick is much more subtle. Tricks such as fake links and malicious URLs are not useful in this case; Because criminals try to imitate senior staff. Last year, toy giant Mattel fell victim to a whaling attack after a senior employee of the group received an email requesting a money transfer. In this attack, Mattel lost almost 3 million dollars.
In voice phishing or vishing, fraudsters create a sense of panic and urgency in you instead of trapping you. In this trick, a cybercriminal calls the person from an unknown number and creates a strong sense of urgency in the person, which causes the person to take action against their interests. These calls usually occur during stressful times, and because of this, the recipient can be tricked into providing personal information to the attacker.