Crypto Fraudsters Employ Multiple Techniques to Acquire Funds

19

In recent days, multiple reports have emerged concerning assaults on individuals within the cryptocurrency sector, underscoring the diverse strategies and tools employed by contemporary cybercriminals.

Crypto Fraudsters Employ Multiple Techniques to Acquire Funds0

Several security incidents have been documented over the last three days, including:

  1. The cryptocurrency exchange BtcTurk experienced a hacking incident. Binance representatives aided in alleviating the aftermath by freezing stolen assets valued at over $5.3 million.
  2. A member of the MakerDAO board was targeted in a phishing scheme, leading to the theft of Aave Ethereum Maker (aEthMKR) and Pendle USDe tokens amounting to $11 million.
  3. The analytical service CoinStats temporarily halted operations following a security breach that impacted 1,590 crypto wallets. The full extent of the damage remains unclear.
  4. Billionaire Mark Cuban reported on X that hackers accessed his Gmail account and cautioned followers against opening emails from his address. The post was subsequently removed.
  5. Curtis James Jackson III, known as 50 Cent, alerted his Instagram followers that his X account and personal website had been compromised. The hackers created the meme coin GUNIT and utilized his resources for promotion.
  6. Recorded Future issued a warning about the Vortax malware, which is disguised as an online conference application. This malware is supported by a blog on Medium and a verified X account with a gold checkmark. Vortax takes advantage of macOS vulnerabilities, draining crypto addresses and stealing credentials for resale.
  7. Proofpoint cautioned that hackers are employing fake error pop-ups in Google Chrome, Microsoft Word, and OneDrive to deceive users into executing harmful PowerShell “fixes.” These can install the crypto miner XMRig, information stealer Lumma Stealer, remote access trojans DarkGate and NetSupport, malware loader Matanbuchus, and botnet Amadey Loader.

It is crucial to recognize that the methods utilized by hackers and cybercriminals are continually advancing, integrating complex social engineering techniques and technological advancements. In response, leading technology and cryptocurrency firms have recently established the Tech Against Scams coalition to safeguard users from online fraud and foster a more secure digital landscape.

Сообщение Crypto Scammers Use Various Methods to Steal Assets появились сначала на CoinsPaid Media.