Blockchain safety agency SlowMist has highlighted 5 widespread phishing methods crypto scammers used on victims in 2022, together with malicious browser bookmarks, phony gross sales orders and trojan malware unfold on messaging app Discord.
It comes after the safety agency recorded a complete of 303 blockchain safety incidents within the yr, with 31.6% of those incidents brought on by phishing, rug pull or different scams, in response to a Jan. 9 SlowMist blockchain safety report.
Malicious browser bookmarks
One of many phishing methods makes use of bookmark managers, a characteristic in most trendy browsers.
SlowMist mentioned scammers have been exploiting these to finally achieve entry to a undertaking proprietor’s Discord account.
Throughout this course of, the scammer can steal a sufferer’s Discord Token (encryption of a Discord username and password) and thus achieve entry to their account, which permits them to publish faux messages and hyperlinks to extra phishing scams posing because the sufferer.
‘Zero greenback buy’ NFT phishing
Out of 56 main NFT safety breaches, 22 of these had been the results of phishing assaults, in response to SlowMist.
One of many extra well-liked strategies utilized by scammers tips victims into signing over NFTs for virtually nothing via a phony gross sales order.
As soon as the sufferer indicators the order, the scammer can then buy the person’s NFTs via a market at a value decided by them.
“Sadly, it isn’t potential to deauthorize a stolen signature via websites like Revoke,” SlowMist wrote.
“Nonetheless, you may deauthorize any earlier pending orders that you simply had arrange, which might help mitigate the chance of phishing assaults and stop the attacker from utilizing your signature.”
Malicious program forex theft
In keeping with SlowMist, this kind of assault normally happens via non-public messages on Discord the place the attacker invitations victims to take part in testing a brand new undertaking, then sends a program within the type of a compressed file that accommodates an executable file of about 800 MB.
After downloading this system, it should scan for recordsdata containing key phrases like “pockets” and add them to the attacker’s server.
“The most recent model of RedLine Stealer additionally has the flexibility to steal cryptocurrency, scanning for put in digital forex pockets data on the native laptop and importing it to a distant management machine,” mentioned SlowMist.
“Along with stealing cryptocurrency, RedLine Stealer may also add and obtain recordsdata, execute instructions, and ship again periodic details about the contaminated laptop.”
‘Clean Examine’ eth_sign phishing
This phishing assault permits scammers to make use of your non-public key to signal any transaction they select. After connecting your pockets to a rip-off web site, a signature software field could pop up with a crimson warning from MetaMask.
After signing, attackers achieve entry to your signature, permitting them to can assemble any information and ask you to signal it via eth_sign.
“Such a phishing may be very complicated, particularly in terms of authorization,” mentioned the agency.
Identical ending quantity switch rip-off
For this rip-off, attackers airdrop small quantities of tokens, reminiscent of .01 USDT or 0.001 USDT to victims typically with an identical tackle, aside from the previous couple of digits within the hopes of tricking customers into by accident copying the unsuitable tackle of their switch historical past.
The remainder of the 2022 report coated different blockchain safety incidents within the yr, together with contract vulnerabilities and personal key leakage.
Associated: DeFi-type initiatives acquired the best variety of assaults in 2022: Report
There have been roughly 92 assaults utilizing contract vulnerabilities within the yr, totaling almost $1.1 billion in losses due to flaws in good contract design and hacked packages.
Non-public key theft then again accounted for roughly 6.6% of assaults and noticed at the very least $762 million in losses, probably the most distinguished examples being the Ronin bridge and Concord’s Horizon Bridge hacks.