Bomb Bitcoin: Scheme of New Crammers to obtain Cryptocurrency

[ad_1]

Cryptocurrency is the icing on the cake every single encrypted hacker wants to "eat". Even after the release of the very first cryptocurrency in the world, scammers are conducting an active war with access to the digital wallets.

If you are a hodler of precious coins, do everything to increase the security of your wallet. Otherwise, you will run the risk of losing your savings and no one will be able to return them.

To not compromise your cryptographic wallet, The shark of the coin has prepared recommendations that will help protect him from the 7 main hacking ways.

Method n. 1: IP Spoofing

You might think that the address of the portfolio is created by the forces of evil. Because remembering this chaotic set of polysemic symbols is difficult. Therefore, for convenience, many people simply copy the address from a seemingly secure place and paste it in any application in order to perform the task.

This trick is used by hackers to create malware to track down and replace information. When a person copies the desired address to the clipboard, the virus replaces it with the hacker's address. After that, the cryptocurrency is transferred to a third-party address – on the criminal's wallet.

Recommendation: check the address entered from the clipboard before sending coins.

Method 2: Malware installation

Theft of personal data from the device is more dangerous than replacing the address. Personal data includes: passwords and account accesses, including portfolios.

The Hacker virus arrives on your computer through fake and even official versions of software products. In the first case, the malware creates a copy of the original code with the virus. In the second, the virus finds a gap, in which it inserts its data package.

The dangerous virus was detected in the All-Radio 4.27 Portable program, which downloaded the virus to the "Windows Temp" system folder during installation.

Warning! Malware works even when the device is turned off.

Another favorite hacker application is the hijacker – Adobe Flash Player. Who would have thought a known application could poison PC and steal data from it. During the installation, a hacker program behaves normally, so it is difficult to distinguish it from the official version. In addition, the application periodically receives an update. As usual.

The ESET security specialist Lukas Stefanko found an interesting scheme: the number of false applications is increasing as well as the increase in the encrypted market.

Recommendation:

  • Because this malware is hidden in programs and runs in the background, an antivirus that detects a hidden threat is required;
  • Download the programs on your PC only from the official developer sites.

Method 3: Infected browser expansion

Modern hackers are so incredibly creative and flexible in their activities that they have learned to implement viruses not just in software products. In browser extensions, viruses may be hidden, tracking all the actions of the PC user.

The most popular browser add-on and the best hacker creation this year is Hola VPN Chrome. The fake version forwards to a phishing page, where hackers get the information they need to hack MyEtherWallet.

Despite warnings from security experts, there are still those who fall in love with the popular browser extensions.

Recommendation:

  • Do not download unknown extensions in the browser;
  • Use only the latest version of the browser.

Method n. 4: False cryptographic wallets

This is the most popular method of cryptographic hackers. The last, let's say, the best hacker scheme was the proposal to install the SpriteCoin token forexistent wallet. The traders were buying good stories about the feasibility and ability of the currency, despite the fact that other information on the currency was missing. They, in their innocence, have downloaded their wallets along with the cryptographic virus.

As soon as the malware is on the PC, it immediately begins to encrypt the hard drive. Files of any kind, become a random set of characters. At the same time, the malware adds an encrypted extension, which blocks the recovery of encrypted data.

From this chaos, for the user of an infected PC, hackers get logins and passwords that are saved in Chrome and Firefox.

But there is the only option to decrypt the data is to pay the criminal 0.3 Monero. Of course, not everything is so simple. When a victim makes a deal with hackers, he receives a decryption key and a bonus trojan that monitors it via webcam and steals digital certificates. As a result, real portfolios and bank accounts are at risk.

Another method of fraud with digital portfolios is the registration on false services. Criminals offer to register on their resource, to open a megabon wallet that provides coins for registration. In effect, these resources simply collect the information needed for hacking portfolios and provide nothing. Although, there are those who still give a wallet, to which hackers also have access to the developers.

Recommendation:

  • Do not be fooled by "big deals", always check the information, look for reviews;
  • Never accept the terms of the scammers;
  • Make a backup copy of your hard drive or just important information from it;
  • Install an effective antivirus that can protect your data in the event of an extraordinary threat.

Method n. 5: social engineering

That is to say, with the help of this method, hackers like to steal private keys from cryptographic portfolios or transfer cryptocurrency to their accounts. Social engineering is very specific in implementation, as it is based on psychological manipulation.

People are much easier to "hack" than their digital devices. Therefore, your excessive trust may not be a threat to malware.

The point is that scammers redirect the victim to a false authorization page. To this end, they send a letter to the e-mail, in which they warn about the blocking of the wallet, if the recipient does not pass the identification. Of course, at the end of the notification there is a link to a phishing page, where the man for innocence enters personal data and consequently loses his digital coins.

Recommendation:

  • If you are lucky enough to receive a false warning, review the sender's address in pieces or, even better, each word with the help of Google;
  • Send a request to the technical support of your wallet to make sure it has really sent the alert. Just do not follow the link with a questionable warning.

Method n. 6: Angry bots

Robots greatly simplify life on the Internet. They take advantage of social networking, ending up with customer service on web resources. However, they can also be useful for scammers, which is dangerous for cryptocurrency hodlers.

If you tune in to a Slack-bot, it will be the first cause of your nightmares and headaches. This is a digital thief of cryptocurrencies, and it should be noted, very effective.

They work as follows: they communicate to the merchant the threat of the cryptographic wallet and redirect it to a phishing resource, in which hackers receive personal data.

Recommendation:

  • Yes, robots greatly simplify networking. However, if you are not sure of your developer, refrain from installing the program;
  • Work only with paid bots of well-known developers.

Method n. 7: dangerous SIM cards

Remember, SIM and crypto wallet are not the best combination. Losing your SIM card, you have lost data is, in the best case. And if the card is meant to be taken by the scammers, then consider that you have "presented for free" your coins.

If the fraudsters get access to the phone number, they can reset all account passwords, which are registered on the SIM card. That is, if your wallet is connected to a SIM, there is a great chance that criminals will reach your online accounts if they have not yet reached them.

Connection to a SIM card it's so unreliable, that even two-step verification does not help.

Recommendation:

  • Provide your portfolio with additional protection with applications such as Telegram or Signal. Good news, traders! The Durov messenger will in future declare the authorization by SMS. Google Authenticator no longer uses this type of verification;
  • Use 2FA authentication.

We have shared with you the main hacker tricks and ways to avoid them. Be extremely careful and never forget the security of your cryptocurrency.

Subscribe to The Coin Shark Facebook news: https://www.facebook.com/coinshark/

[ad_2]Source link