Phishing is a fraudulent attempt to obtain your private information by disguising oneself as a trustworthy website. It is prevalent in cryptocurrencies. The attackers mostly use two methods to achieve this:
Phishing Types and Attacks:
- Clone phishing: the attacker will clone a legitimate email, but will redirect the links into a malicious site.
- Spear phishing: more sophisticated, the attacker will first collect information about the victim and then, based on those data, will message and convince the victim to visit a malicious website or download a file.
- Pharming: this cyber attack intends to redirect a website’s traffic to a malicious site by changing the host’s file on a victim’s computer, or by exploiting a vulnerability in the DNS server.
- Whaling: malicious hacking, which involves hunting for data that can be used by the hacker to blackmail the victim.
- Email Spoofing: The emails spoof communications from legitimate entities or people. They present links to malicious sites where the attacks will collect your login and private information.
- Typosquatting: this technique is also known as URL hijacking. It targets users who incorrectly type a website address into their browser.
- Impersonation & Giveaways: probably the most common phishing attacks that anyone in Cryptocurrency for more than 2 months already saw once. This technique involves impersonating an influent figure on social media and advertising giveaways or engage in other shady practices. Be careful about any direct message on Slack, Discord, Telegram, and Twitter.