5 sneaky tricks crypto phishing scammers used last year: SlowMist

1 year ago

Blockchain information steadfast SlowMist has highlighted 5 communal phishing techniques crypto scammers utilized connected victims successful 2022, including malicious browser bookmarks, phony income orders and trojan malware dispersed connected messaging app Discord.

It comes aft the information steadfast recorded a full of 303 blockchain information incidents successful the year, with 31.6% of these incidents caused by phishing, rug propulsion oregon different scams, according to a Jan. 9 SlowMist blockchain information report.

A pastry illustration of onslaught methods successful 2022 successful percentages Source: SlowMist

Malicious browser bookmarks

One of the phishing strategies makes usage of bookmark managers, a diagnostic successful astir modern browsers.

SlowMist said scammers person been exploiting these to yet summation entree to a task owner’s Discord account.

"By inserting JavaScript codification into bookmarks done these phishing pages, attackers tin perchance summation entree to a Discord user's accusation and instrumentality implicit the permissions of a task owner's account,” the steadfast wrote.

After guiding victims to adhd the malicious bookmark done a phishing page, the scammer waits until the unfortunate clicks connected the bookmark portion logged into Discord, which triggers the implanted JavaScript codification and sends the victim's idiosyncratic accusation to the scammer's Discord channel. 

During this process, the scammer tin bargain a victim's Discord Token (encryption of a Discord username and password) and frankincense summation entree to their account, which allows them to station fake messages and links to much phishing scams posing arsenic the victim.

‘Zero dollar purchase’ NFT phishing

Out of 56 major NFT information breaches, 22 of those were the effect of phishing attacks, added SlowMis

One of the much fashionable methods utilized by scammers would instrumentality their victims into signing implicit NFTs for practically thing done a phony income order.

Once the unfortunate signs the order, the scammer tin past acquisition the user's NFTs done a marketplace astatine a terms determined by them.

Cast your ballot now!

"Unfortunately, it's not imaginable to deauthorize a stolen signature done sites similar Revoke," the study wrote.

"However, you tin deauthorize immoderate erstwhile pending orders that you had acceptable up, which tin assistance mitigate the hazard of phishing attacks and forestall the attacker from utilizing your signature."

Trojan equine currency theft

According to SlowMist, this benignant of onslaught usually occurs done backstage messages connected Discord wherever the attacker invites victims to enactment successful investigating a caller project, past sends a programme successful the signifier of a compressed record that contains an executable record of astir 800 MB.

After downloading the program, it volition scan for files containing cardinal phrases similar "wallet" and upload them to the attacker's server.

"The latest mentation of RedLine Stealer besides has the quality to bargain cryptocurrency, scanning for installed integer currency wallet accusation connected the section machine and uploading it to a distant power machine,” said SlowMist.

“In summation to stealing cryptocurrency, RedLine Stealer tin besides upload and download files, execute commands, and nonstop backmost periodic accusation astir the infected computer."

An illustration of the RedLine Stealer successful action. Source: SlowMist

‘Blank Check’ eth_sign phishing

This phishing onslaught allows scammers to usage your backstage cardinal to motion immoderate transaction they choose. After connecting your wallet to a scam site, a signature exertion container whitethorn popular up with a reddish informing from MetaMask.

After signing, attackers summation entree to your signature, allowing them to tin conception immoderate information and inquire you to motion it done eth_sign.

“This benignant of phishing tin beryllium precise confusing, particularly erstwhile it comes to authorization," said the firm.

Same ending fig transportation scam

For this scam, attackers airdrop tiny amounts of tokens, specified arsenic .01 USDT oregon 0.001 USDT to victims often with a akin address, but for the past fewer digits successful the hopes of tricking users into accidentally copying the incorrect code successful their transportation history.

An illustration of a aforesaid extremity fig phishing attempt. Source: SlowMist

The remainder of the 2022 study covered different blockchain information incidents successful the year, including declaration vulnerabilities and backstage cardinal leakage.

Related: DeFi-type projects received the highest fig of attacks successful 2022: Report

There were astir 92 attacks utilizing declaration vulnerabilities successful the year, totaling astir $1.1 cardinal successful losses due to the fact that of flaws successful astute declaration plan and hacked programs.

Private cardinal theft connected the different manus accounted for astir 6.6% of attacks and saw astatine slightest $762 cardinal successful losses, the astir salient examples being the Ronin bridge and Harmony’s Horizon Bridge hacks.

View source