Phishing Attacks

Do repost and rate:

What is Phishing?

It is a common cyber-attack of sending fraudulent communications that appear to come from a reputable source.

Purpose of Phishing?

Hackers try to get personal data or sensitive information to fully gain control of your personal accounts or business entities' accounts. The worst hackers can do is steal data for sale or possibly ask for ransom fees.

How Phishing Works?

  1. Hackers identify target audiences or groups
  2. Counterfeit communications appear from a trustworthy source
  3. Frequently use emotions like fear, curiosity, urgency, or greeting to offer helps and ask to share sensitive information or open attachments or click links

Types of Phishing

Spear phishing: target specific individuals to gain account access fully to a wide group of people or entities later

Business Email Compromise (BEC): sent fraudulent emails to ask for click on links or attachments

: pretending to be CEO or a big fish to ask you a favor to access login access

Social Media Phish: attack social media users with fraudulent helps support offering

Voice Phishing: calling to present support to obtain sensitive information

Common Crypto Phishing (Discord)

Winning Crypto: you will receive a message of winning a huge lottery and ask to either click a link to claim your winnings or go to the website to submit your account information

Claim Reward: a legitimate like direct message asking you to claim your reward from nowhere and click a link

Customer Supports: a legitimate like direct message offers support and ask you to fill out a Google document or go to the website to connect your wallet

Fake Bots: a common use bot that asks to verify your account and connect with your wallet

What To Do (Discord)

  1. Think twice: do not click anything from a direct message
  2. Check users’ names: check their profile, mutual servers shared, and mutual friends
  3. Ask around before clicking: screenshot the conversation and share in the forum with others to verify 
  4. Search server with user names: research user name with shared server to see such user actually had any conversation in channels
  5. Submit and report: click spam and block users
This article is also published in Cryptologist as parnership publication.

Photo by stephen momot Unsplash

Note: the post was shared on multiple platforms 

You can refer my previous article lists

Digital Commodities- the Unlimited Resources of Commodities Has Born

Universal Income in Crypto Way

DeFi 1.0 is Officially Dead - Welcome to DeFi 2.0

NFT Has a New Purpose

How Many Ads Are Too Much - Floki Inu Ads Got Backfire

Metaverse - Second Life Era

Bitcoin ATM Adoption and Its Potential Security Vulnerabilities

When Corporations Are Running By Everyone

The Fundamental Value Is Irrelevant

Coinbase At Huge Reputation Crisis

CBDCs' Flaw Design

Regulations Start Hitting Crypto Exchanges

From Bitcoin Standard To Zero-Knowledge Proofs - Decentralization 2.0

Shiba Hits 1 Million Users (Army) Milestone: What is Next?

How To Avoid Crypto Scammers

Crypto Philanthropy

Shiba Game - When Meme Meets Metaverse

Twitter CEO Steps Down - A Full-Time Bitcoiner

Change of Macroeconomy Landscape

CBDC Is Losing The Game

Crypto AWS

Doge The Future

El Salvador's Bitcoin

Market Sentiment Has Changed

Brief History of Ethereum and How Ethereum 2.0 May Over Promise

Crypto Is Getting Real

Who Cares If Craig Wright Is The Real Satoshi

Institutional Investors vs. Whales

What Happened In BadgerDao

A Proposal To Move Bitcoin Mining PoW Away

IMF Keep Crying Out, Crypto Adoption Keep Accelerating

Dogecoin Is Back to Top 10 But The Moon Shot Is Looming

How to Avoid The New Wallet Scam

Defi Enters To Crypto Bond Phase

What Types of Metaverse You Want

Global Regulations Are Coming Or Can They

IMF Did Have A Plan to Run Global Regulations

Doge Starts Moving

A New Malware Will Steal From Telegram

Smart Money Is Out, Institutional Money Is In

Wait, Web3 or Web 3.0 or web3

Airdrop?! Not So Lucky Anymore!

2022 Prediction #1: L1 Scalability

2022 Prediction #2: L2 Bridges

2022 Prediction #3: Zero-Knowledge Proofs or ZKPs

2022 Prediction #4: Regulated Defi On-Chain KYC

2022 Prediction #5: Institutional Crypto Adoption

2022 Prediction #6: Defi Insurance

2022 Prediction #7: NFTs-Based Communities - DAO 1.5

2022 Prediction #8: Metaverse and NFTs

2022 Prediction #9: Web2 Companies’ FOMO

2022 Prediction #10: Time for DAO 2.0

Craig vs People

Polygon Enters ZKPs - Plonky2

Crypto.com Backfire - When Centralized Crypto Service Panic

Coinbase NFT Marketplace

Crypto Paycheck

Coinbase Customer Service Alive

When Meta Patented Metaverse

When You Want Someone Forget About What You Did, Just Change You Name

When YouTube Enters Into NFTs

Facebook Just Did the Rug Pull

Bridging Between Web2 to Web3 Through NFTs

DAO The Way Part 1

DAO The Way Part 2

Who Is The Winner of The Crypto Adoption

-------------------------------------------------------------------------------------

Disclosure: The article was written by a delusional author who is possibly a nut job without any questions whatsoever about expertise in the subject matters. You should not believe any words this author wrote or you may experience similar symptoms or even possibly become a nut job.

Regulation and Society adoption

Ждем новостей

Нет новых страниц

Следующая новость