Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The cryptocurrency market is full of scammers because itâs relatively new, complicated technology backed by tons of hype. Itâs easier to fool someone into giving you crypto than invest in your fake real estateâââand unfortunately many have.
The reason stealing crypto is becoming such a hobby is that it is untraceable and unrevokable. As soon as you issue the paymentâââit is gone. We are going to have a look at scamming techniquesâââfrom simple to âbrutal forceâ.
Hacking essentials
In essence, every hacking is based on psychologyâââyou need to know the mindset of those you want to hack.Hackers donât start by breaking down a wallâââthat is their last resort. They have to first test if there are any doors or windows left open. That is why knowing the mindset of the victims is so importantâââwhat have they neglected? If you have 10 strong passwords and one weakâââthat weak one can become the backdoor to compromise all the strong ones too. Thus, it is important to keep your guards up 360.
The simplest form
Oneâââunfortunatelyâââvery efficient technique is abusing our laziness. We see the picture of celebrities or Telegram channel admins, but do we also see the small (actually, missing) badges too? We see goolge.com links and @VitailkButerin accounts and sometimes fail to pay attention that they contain typos, which are not there by mistake. Just look at this link on Etherscan to see how new victims fall for scam every single minute, despite all warnings.
It is believed that these scammers make $5,000 every day.So rule #1: always verify who you are dealing with.
Spoofing and phishing
Phishing gets one level more sophisticated when you actually expect something. A âChange your password nowâ email seems much more relevant when you were trying to make changes to your account than when it lands unexpectedly. Or if the email comes from someone in your organization, you are much more likely to trust it (something that is unfortunately very easy to create with email spoofing). So rule #2 in the words of Mad-eye Moody: constant vigilance!
Scam ICOs
Another âpopularâ scam method is through fake ICOs. This one usually involves lot more effortâââafter all scammers have to fake a white paper, setup a fake website and come up with a fake blockchain idea that will change the world. This process also involves paying for ads or hiring people on fiverrâââall to make it look authentic. There have also been reports of identity thefts to make the team behind the project look legitimate. One way to really verify the validity of the ICO is to make sure the project makes senseâââif it does, chances are that the project could do much better actually executing, than just do a scam exit. This article sheds some light on what blockchain is good for, and what it isnât. Also, check their whitepaper, their github repos and their background.
Hacking your computer to steal your keys
If your private keys fall in the wrong hands, youâre screwed. There is no âcustomer supportâ you can turn to, to get your account back. For this, the hackers would need to install a virus or a spyware on your computer. Thatâs why many people print their keys or use hardware wallets to make sure there is no âphysicalâ trace of the keys on their computers.
Exploiting bugs in contracts
Infamous cases such as the DAO hack have crippled otherwise promising projects. Blockchain is still very young but also very complex. As with every new technology, there is still a long way to go before all the necessary tools and kits have been developed to aid developers in their quest to write robust code. This report and this report show how fragile even legitimate projects are, let alone fake honeypot projects designed to take your crypto away.
Brutal force!
If all of the above do not work, then there is still one danger left; pure brutal force! While this one is not hacking by nature, but it still relies on the features of crypto: untraceable and irreversible transactions. There have been news on people getting robbed using real violence, keeping the victims captive and forcing them to transfer their cryptos to the attackers address. One way to cope with these attacks is to keep your earnings obscuredâââuse a new bitcoin address for all transactions and it would be very hard to link all of them back to you.
Closing Thoughts
Hacking is all about people. It always starts with simpler methods and builds up to more complex. We cannot rely solely on technology to solve these issues and warn us in advance. Remember; before being in your wallet, the hackers have already been in your head. Keep them out.
In case you liked my article, feel free to clapâââit helps me get more exposure. Thanks!
Still Effective Crypto Scamming Tactics was originally published in Hacker Noon on Medium, where people are continuing the conversation by highlighting and responding to this story.
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.