How are cybercriminals targeting cryptocurrency users?

Reading time: 3 minutes

With the popularization of digital tokens, there is a tendency for more people to be victims of fraud. Cybercriminals are sending phishing emails daily, using a variety of techniques to steal cryptocurrencies from their victims.

Some of these techniques include requests for donations to charities, email compromise scams, among many others, but they all have something in common, requesting payments with cryptocurrencies.

According to a report released by Proofpoint, an American company specializing in corporate security, an average of one million extortion emails are blocked daily.

The vast majority of these emails are aimed at compromising users’ cryptocurrency wallets by collecting their credentials.

The popularization of Web 3.0 in recent years has caused a major shift in the phishing landscape, spawning a wide variety of social engineering and exploitation mechanisms that aim to steal cryptocurrencies in different ways.

Spam emails with rogue URLs that direct victims to pages to collect their credentials, or even fake versions of NFT trading platforms are becoming increasingly common.

The vast majority of these pages are created with Phishing Kits, they allow cybercriminals to deploy an effective phishing page, regardless of your skill level.

But phishing is not the only strategy used by scammers, unfortunately there is a wide variety, so it is very important to know these scams and be aware to avoid them.

cybercriminals

The most common scams involving cryptocurrencies create by cybercriminals

As we have already mentioned, there are a variety of scams used by criminals, so it is extremely important to understand how these scams are carried out. Here are the most common scams for you to be aware of.

Fake Wallets

Fake wallets are becoming more and more frequent. Hackers create copies, often almost perfect, of renowned cryptocurrency wallets, the moment the user deposits their balance in them, criminals can have full access to their funds.

Fake Investment Robots

It is an automated investment scheme, in which there is a promise of high profits, without the user having to do anything at all, except pay the fees. Scammers trick the user into believing that the system is still “operating”, in this way they manage to steal all the money invested.

Fake Exchange Apps

Fake Exchange apps are being discovered almost daily, they are available on platforms like the Google Play Store. These apps are viruses in disguise, designed to infect users’ mobile phones and steal their credentials.

Fake Investment Club

Fake investment clubs work as follows, the user is induced to create a registration within the scammer’s page and pay for a certain investment package, but the money is not used to make any type of investment, in a short time the page disappears with all the funds raised.

Financial Pyramids

Financial pyramids are operations that depend on attracting new people to sustain the gain of the first ones. The operating company usually pays very well those who attract new customers, which ends up attracting more and more people, but at some point this cycle ends up breaking, since this system is unsustainable, leaving people with huge losses.

Phishing and Malware

This is certainly the most famous scam used by cybercriminals. The phishing strategy is used to obtain personal, banking and even passwords from victims. Emails or chats are sent to thousands of users as bait. Most of the time they are links to pages or contacts, very similar to banks and exchanges.

As we could see, the variety of scams that we can come across is huge, so it is essential to always be attentive, validate all information and not give your data anywhere.

Leave a Reply

Your email address will not be published. Required fields are marked *