Agencies-Gaza post
Kaspersky: 200,000 attacks targeting crypto
Kaspersky specialists took a closer look at the phishing pages, targeting potential investors in crypto, as they examined negative files, distributed under the names of the 20 most popular crypto portfolios, and Kaspersky’s products had been discovered and blocked since the start of the year 2022 towards 200,000 hunting attempts to steal crypto and data accrediting users’ entry into their portfolio accounts.
The number of such attempts reached almost 50,000 in April alone, half the number of attempts seen in the first quarter of the year, and digital currency portfolios are the primary target of fraud attempts and disruptive activities.
Kaspersky’s experts have noticed different methods of cybercriminals stealing crypto, in confluence with the prosperity observed in this area over the past five years, running from luring victims with gifts sent from crypto exchanges to distributing decentralized finance applications (DeFi) with dangerous petrogenesis. Cryptocurrency portfolios are the primary target of fraudsters, as they are the primary place of protection for these currencies, which deals in large quantities of them.
In 2022, Kaspersky’s products recorded 193,125 trolling attempts targeting potential investors or users interested in crypto mining. During the first quarter of this year, Kaspersky experts located about 107,000 attempts, and then in April alone, there were nearly 50,000 tries, essentially half the number of phishing tries that occurred in the first quarter.
Confidential phrase
Fraudsters are keen to mimic the websites of the crypto portfolio and attract their targets to enter the initial 12-24 word confidential phrase, which guarantees wallet security, as well as password and private code. Once the user has entered his confidential phrase, he is directed to the real website, but after his account and all his protection falls into the hands of the fraestheists.
In fact, digital currency portfolios have become the target of many disruptive and fraudulent activities, including not only phishing pages disguised in the form of official sites of the most widespread portfolio, but also malware distributed under those portfolios’ names.