Cryptocurrency users often autumn prey to online hacks with Mark Cuban being conscionable the latest high-profile example how astir a cardinal dollars tin permission your integer wallet.
It is imaginable to substantially bolster the information of your funds by heeding 3 elemental guidelines that volition beryllium outlined successful this article. But earlier delving into these, it's important to recognize the benignant of menace that exists today.
FBI has wide grounds connected the Lazarus Group
The Lazarus Group is simply a North Korean state-sponsored hacking group, known for their blase attacks linked to assorted cyberattacks and cybercriminal activities, including the WannaCry ransomware attack.
WannaCry disrupted captious services successful galore organizations, including healthcare institutions and authorities agencies by encrypting files connected infected computers and demanding a ransom outgo successful Bitcoin (BTC).
One of its earliest crypto-related hacks was the breach of South Korean crypto speech Yapizon (later rebranded to Youbit) successful April 2017, resulting successful the theft of 3,831 Bitcoin, worthy implicit $4.5 cardinal astatine the time.
The Lazarus Group's activities successful the cryptocurrency abstraction person raised concerns astir its quality to make funds for the North Korean authorities and evade planetary sanctions. For instance, successful 2022 the radical was tied to a fig of high-profile cryptocurrency hacks, including the theft of $620 cardinal from Axie Infinity bridge Ronin.
The Federal Bureau of Investigation (FBI) blamed Lazarus Group for the Alphapo, CoinsPaid and Atomic Wallet hacks, stating that losses from each of these hacks adhd up to implicit $200 cardinal the radical has stolen successful 2023.
This month, the FBI have attributed Lazarus Group to a $41 cardinal hack of the crypto gambling tract Stake, which was carried retired done a spear-phishing run that targeted immoderate of its employees.
Lastly, according to blockchain information steadfast SlowMist, the $55 cardinal hack of the crypto speech CoinEx was carried retired by the North Korean authorities sponsored hackers.
Most hacks impact societal engineering and exploit quality error
Contrary to what movies usually display, meaning hackers either gaining carnal entree to devices oregon brute forcing passwords, astir hacks hap through phishing and societal engineering. The attacker relies connected quality curiosity oregon greed to entice the victim.
Those hackers whitethorn airs arsenic lawsuit enactment representatives oregon different trusted figures successful bid to instrumentality victims into giving up their idiosyncratic information.
For instance, a hacker mightiness impersonate a company's IT enactment and telephone an employee, claiming they request to verify their login credentials for a strategy update. To physique trust, the attacker mightiness usage nationalist accusation astir the institution and the target's role.
Related: North Korean crypto hacks down 80%, but that could alteration overnight: Chainalysis
Phishing attacks impact sending deceptive emails oregon messages to instrumentality recipients into taking malicious actions. An attacker mightiness impersonate a reputable organization, specified arsenic a bank, and nonstop an email to a user, asking them to click connected a nexus to verify their account. The nexus takes them to a fraudulent website wherever their login credentials are stolen.
Baiting attacks connection thing enticing to the victim, specified arsenic escaped bundle oregon a occupation opportunity. An attacker poses arsenic a recruiter and creates a convincing occupation posting connected a reputable occupation hunt website. To further found trust, they whitethorn adjacent behaviour a fake video interview, and aboriginal pass the campaigner that they person been selected. The hackers proceed by sending a seemingly innocuous file, similar a PDF oregon a Word document, which contains malware.
How crypto investors tin debar hacks and exploits
Luckily, contempt the expanding sophistication and capabilities of hackers today, determination are 3 elemental steps you tin instrumentality to support your funds safe. Namely:
- Use hardware wallets for semipermanent retention of your crypto assets, not straight connected to the internet, making them highly unafraid against online threats similar phishing attacks oregon malware. They supply an other furniture of extortion by keeping your backstage keys offline and distant from imaginable hackers.

- Enable Two-Factor Authentication, oregon 2FA, connected each your crypto speech and wallet accounts. This adds an other information measurement by requiring you to supply a one-time codification generated by an app similar Google Authenticator oregon Authy. Even if an attacker manages to bargain your password, they won't beryllium capable to entree your accounts.
- Be highly cautious erstwhile clicking connected links connected emails and societal media. Scammers often usage enticing offers oregon giveaways to lure victims. Use abstracted "burner" accounts oregon wallets for experimenting with caller decentralized applications and for airdrops to trim the hazard of losing your funds.
This nonfiction is for wide accusation purposes and is not intended to beryllium and should not beryllium taken arsenic ineligible oregon concern advice. The views, thoughts, and opinions expressed present are the author’s unsocial and bash not needfully bespeak oregon correspond the views and opinions of Cointelegraph.