[ad_1]
It seems that the imminent hard forks in both Ethereum (ETH) and Ethereum Classic (ETC), allow scammers to steal funds from users. There appear to be some sites promoting new networks on Ethereum and Ethereum Classic. In the coming days, both ETH and ETC will experience a network upgrade that includes a fixed fork.
According to a recent report published on CCN, there are two false false forks called Ethereum Nowa and Ethereum Classic Vision that aim to steal user funds. Ethereum Nowa claims to be a hard fork of Ethereum while Ethereum Classic Vision claims to be bifurcated by Ethereum Classic.
The way these scammers the job is very simple. Both require users to provide them with their private keys. Those users who are not aware could certainly lose their funds if they give their private keys. Both Firefox and MetaMask have been able to detect these fraudulent sites.
According to the company that has investigated these fake sites, Look, users have been promised that they will be able to receive their coins and new coins from the supposedly new chains. However, these cryptographic projects have shown that they are simply stealing users' private keys and giving nothing to anyone.
Watch commented on this problem:
"When you log into the Ethereum Nowa website, users can click on the Portfolio button – this will redirect you to the creation page of Ethereum Nowa, creating portfolios / importing your old wallet, this is exactly where the trap is."
Look explains that the Ethereum Classic Vision the page seemed firmer. However, once the page has been analyzed, the supplied code part cancels the private key data to the Ethereum Classic Vision servers and the mask as an API token.
The next Ethereum hard fork will prepare the network for a Proof-of-Stake (PoS) consent algorithm. Ethereum miners will now receive 2 ETHs instead of 3 ETHs each time they find a block.
Ethereum Classic suffered a 51% attack a few days ago. There was a group of miners who controlled over 51% of the network hash speed and were able to execute double expense attacks.
[ad_2]
Source link