Binance Square
#phishingattack

phishingattack

37,201 views
53 Discussing
Crypto King2
ยท
--
Crypto King2 12:43 AMใƒปMar 14, 2024 Crypto Alert: $2 Million Lost in eETH Phishing Attack! ๐Ÿšจ In a recent report by BlockBeats, a devastating phishing attack targeted a user whose address begins with 0x39b, causing them to suffer a staggering loss of $2 million in eETH. ๐Ÿ˜ฑ The malicious transaction, designed to boost subsidies, resulted in the substantial loss of valuable assets. This incident serves as a stark reminder for crypto holders to prioritize security measures and remain vigilant against rising phishing threats. Stay safe, stay alert! ๐Ÿ”’ #CryptoSecurity #phishingattack Follow | Like โค๏ธ | Quote ๐Ÿ”„ | Comment
Crypto King2

12:43 AMใƒปMar 14, 2024
Crypto Alert: $2 Million Lost in eETH Phishing Attack! ๐Ÿšจ

In a recent report by BlockBeats, a devastating phishing attack targeted a user whose address begins with 0x39b, causing them to suffer a staggering loss of $2 million in eETH. ๐Ÿ˜ฑ The malicious transaction, designed to boost subsidies, resulted in the substantial loss of valuable assets. This incident serves as a stark reminder for crypto holders to prioritize security measures and remain vigilant against rising phishing threats. Stay safe, stay alert! ๐Ÿ”’ #CryptoSecurity #phishingattack

Follow | Like โค๏ธ | Quote ๐Ÿ”„ | Comment
Article
Tron Reveals X Account Breach Was Caused by Sophisticated Social Engineering SchemeTron DAO has officially confirmed that its primary X (formerly Twitter) account was compromised late Friday evening following a highly targeted social engineering attack against one of its senior communications staff. In a statement shared early Saturday morning, Tron explained that the attacker impersonated a representative from a prominent blockchain media outlet, convincing a team member to grant access to a third-party scheduling tool. The tool was then used to bypass direct platform logins and post a fake โ€œTRX Anniversary Airdropโ€ link to over 1.2 million followers. โ€œThe individual behind this breach executed a well-crafted social engineering strategy, including a fake press briefing invitation and forged NDAs,โ€ the Tron team stated. โ€œOnce access was obtained, the account was used to spread malicious links that directed users to a phishing site.โ€ The site, designed to mimic Tronโ€™s official staking dashboard, lured users into connecting their wallets to claim a non-existent airdrop. Several victims have since reported unauthorized withdrawals of $TRX and TRC-20 tokens. The fraudulent post remained live for just under an hour before the team regained control of the account. Tron has since removed all malicious content and launched a full internal security audit, working with cybersecurity firms to trace stolen funds. No backend systems, smart contracts, or core infrastructure were affected, the team emphasized. However, the event has sparked renewed concerns over centralized access controls and the risks posed by third-party applications. Justin Sun, founder of Tron, took to X shortly after the incident was contained, urging users to โ€œnever trust sudden airdrop linksโ€ and assuring the community that new security protocols, including hardware key requirements, will be implemented across all Tron-managed platforms. Initial estimates suggest that over $90,000 in user funds may have been stolen, though investigations are ongoing. Users are advised to revoke permissions from any suspicious dApps and remain cautious. #TronHack #TRXAlert #CryptoSecurity #PhishingAttack #BlockchainNews

Tron Reveals X Account Breach Was Caused by Sophisticated Social Engineering Scheme

Tron DAO has officially confirmed that its primary X (formerly Twitter) account was compromised late Friday evening following a highly targeted social engineering attack against one of its senior communications staff.
In a statement shared early Saturday morning, Tron explained that the attacker impersonated a representative from a prominent blockchain media outlet, convincing a team member to grant access to a third-party scheduling tool. The tool was then used to bypass direct platform logins and post a fake โ€œTRX Anniversary Airdropโ€ link to over 1.2 million followers.
โ€œThe individual behind this breach executed a well-crafted social engineering strategy, including a fake press briefing invitation and forged NDAs,โ€ the Tron team stated. โ€œOnce access was obtained, the account was used to spread malicious links that directed users to a phishing site.โ€
The site, designed to mimic Tronโ€™s official staking dashboard, lured users into connecting their wallets to claim a non-existent airdrop. Several victims have since reported unauthorized withdrawals of $TRX and TRC-20 tokens.
The fraudulent post remained live for just under an hour before the team regained control of the account. Tron has since removed all malicious content and launched a full internal security audit, working with cybersecurity firms to trace stolen funds.
No backend systems, smart contracts, or core infrastructure were affected, the team emphasized. However, the event has sparked renewed concerns over centralized access controls and the risks posed by third-party applications.
Justin Sun, founder of Tron, took to X shortly after the incident was contained, urging users to โ€œnever trust sudden airdrop linksโ€ and assuring the community that new security protocols, including hardware key requirements, will be implemented across all Tron-managed platforms.
Initial estimates suggest that over $90,000 in user funds may have been stolen, though investigations are ongoing. Users are advised to revoke permissions from any suspicious dApps and remain cautious.

#TronHack #TRXAlert #CryptoSecurity #PhishingAttack #BlockchainNews
โš ๏ธ $15M+ Lost in DeFi Hacks โ€“ Bunni DEX & Venus Protocol Hitโš ๏ธ ๐Ÿ”ด Bunni DEX Exploit On Sept 2, Bunni was exploited for $2.3M on Ethereum. Attackers hit the USDT & USDC vaults and moved funds through the DeFi. Bunni has paused all the contracts across networks. ๐ŸŸ  Venus Protocol Phishing Venus lost $13.5M from a phishing attack (not a contract bug). Ops are paused while security checks run. โš ๏ธ Reminder:Watch out for phishing, double-check links, and stay careful with DeFi. ๐Ÿ‘‰ Stay safe out there! #StaySafeCryptoCommunity #phishingattack #DEFฤฐ $XRP {future}(XRPUSDT)
โš ๏ธ $15M+ Lost in DeFi Hacks โ€“ Bunni DEX & Venus Protocol Hitโš ๏ธ

๐Ÿ”ด Bunni DEX Exploit
On Sept 2, Bunni was exploited for $2.3M on Ethereum. Attackers hit the USDT & USDC vaults and moved funds through the DeFi. Bunni has paused all the contracts across networks.

๐ŸŸ  Venus Protocol Phishing
Venus lost $13.5M from a phishing attack (not a contract bug). Ops are paused while security checks run.

โš ๏ธ Reminder:Watch out for phishing, double-check links, and stay careful with DeFi.

๐Ÿ‘‰ Stay safe out there!

#StaySafeCryptoCommunity #phishingattack #DEFฤฐ
$XRP
ยท
--
๐Ÿšจ *Phishing Attack: 50M USDT Stolen, 48-Hour Ultimatum! โณ* A victim of a massive phishing scam has fought back! ๐Ÿ’ช - _50 million USDT stolen_, but the attacker has been tracked ๐Ÿ” - Victimโ€™s message to hacker: _"Weโ€™ve filed a case, and youโ€™re under 24/7 surveillance"_ ๐Ÿ˜ฑ - Offer: Return 98% of funds + keep $1M bounty ๐Ÿค‘ - Deadline: *48 hours* โฐ ๐Ÿ‘ฎโ€โ™‚๏ธ _No cooperation?_ Legal & law enforcement action incoming! ๐Ÿ”— Track the address: [Victimโ€™s specified address] #PhishingAttack #CryptoSecurity #USDT #WhiteHat #Blockchain
๐Ÿšจ *Phishing Attack: 50M USDT Stolen, 48-Hour Ultimatum! โณ*

A victim of a massive phishing scam has fought back! ๐Ÿ’ช
- _50 million USDT stolen_, but the attacker has been tracked ๐Ÿ”
- Victimโ€™s message to hacker: _"Weโ€™ve filed a case, and youโ€™re under 24/7 surveillance"_ ๐Ÿ˜ฑ
- Offer: Return 98% of funds + keep $1M bounty ๐Ÿค‘
- Deadline: *48 hours* โฐ

๐Ÿ‘ฎโ€โ™‚๏ธ _No cooperation?_ Legal & law enforcement action incoming!
๐Ÿ”— Track the address: [Victimโ€™s specified address]

#PhishingAttack #CryptoSecurity #USDT #WhiteHat #Blockchain
ยท
--
Bullish
๐Ÿšจ $48M Gone in a Click โ€” South Koreaโ€™s Bitcoin Blunder ๐Ÿšจ South Korea reportedly lost $48 million in seized Bitcoin โ€” not to a hack, but a phishing scam ๐Ÿ˜ฌ ๐Ÿ’ป Fake website fooled a government employee ๐Ÿ”‘ Wallet credentials compromised ๐Ÿ’ฐ ~70 billion won in BTC vanished The breach surfaced during an audit at the Gwangju District Prosecutorsโ€™ Office, exposing a harsh reality: ๐Ÿ”” Cold storage isnโ€™t invincible โš ๏ธ Human error is still the weakest link ๐Ÿ›๏ธ Governments arenโ€™t immune to crypto security failures ๐Ÿ” Authorities are tracing the funds โš–๏ธ Custody standards may now face scrutiny If governments can lose BTC to phishingโ€ฆ whoโ€™s really safe? #bitcoin.โ€ #CryptoSecurity #phishingattack $BTC {spot}(BTCUSDT)
๐Ÿšจ $48M Gone in a Click โ€” South Koreaโ€™s Bitcoin Blunder ๐Ÿšจ
South Korea reportedly lost $48 million in seized Bitcoin โ€” not to a hack, but a phishing scam ๐Ÿ˜ฌ
๐Ÿ’ป Fake website fooled a government employee
๐Ÿ”‘ Wallet credentials compromised
๐Ÿ’ฐ ~70 billion won in BTC vanished
The breach surfaced during an audit at the Gwangju District Prosecutorsโ€™ Office, exposing a harsh reality:
๐Ÿ”” Cold storage isnโ€™t invincible
โš ๏ธ Human error is still the weakest link
๐Ÿ›๏ธ Governments arenโ€™t immune to crypto security failures
๐Ÿ” Authorities are tracing the funds
โš–๏ธ Custody standards may now face scrutiny
If governments can lose BTC to phishingโ€ฆ whoโ€™s really safe?
#bitcoin.โ€ #CryptoSecurity #phishingattack $BTC
GOVERNMENT OFFICE HAS $48 MILLION GONE! ๐Ÿšจ โ€‹South Korea's Gwangju District Prosecutorsโ€™ Office discovered during a routine audit that their seized Bitcoin ($BTC) worth 70 Billion Won ($48 Million) has gone missing. ๐Ÿ˜ฑ โ€‹๐Ÿ“‰ What Happened? โ€‹A government employee fell victim to a Phishing Scam. While checking the seized assets (stored on USB devices), he accidentally clicked on a Fake Website. โ€‹Result: Wallet credentials and passwords were leaked and hackers cleared the entire fund! โ€‹๐Ÿ” Key Highlights: โ€‹Huge Loss: Approximately 70 Billion Won stolen. โ€‹Security Breach: Despite being a large agency, a major lapse in security protocols. โ€‹Offline Storage Fail: This incident shows that if credentials are not safe, even "offline" storage is at risk. โ€‹๐Ÿ’ก What Lesson Do We Learn? โ€‹If a government agency with layered security can fall victim to phishing, how safe are you and I? โ€‹Never click on suspicious links. โ€‹Always double-check that the website is genuine. โ€‹Itโ€™s time to globally rethink institutional custody and security rules. โ€‹Do you think there is a better way to store seized crypto? Share your thoughts in the comments! ๐Ÿ‘‡ โ€‹#SouthKoreaSeizedBTCLoss #BTC #CryptoSecurity #PhishingAttack #BlockchainNews #GwangjuNews #CryptoSafety$BTC {spot}(BTCUSDT)
GOVERNMENT OFFICE HAS $48 MILLION GONE! ๐Ÿšจ
โ€‹South Korea's Gwangju District Prosecutorsโ€™ Office discovered during a routine audit that their seized Bitcoin ($BTC ) worth 70 Billion Won ($48 Million) has gone missing. ๐Ÿ˜ฑ
โ€‹๐Ÿ“‰ What Happened?
โ€‹A government employee fell victim to a Phishing Scam. While checking the seized assets (stored on USB devices), he accidentally clicked on a Fake Website.
โ€‹Result: Wallet credentials and passwords were leaked and hackers cleared the entire fund!
โ€‹๐Ÿ” Key Highlights:
โ€‹Huge Loss: Approximately 70 Billion Won stolen.
โ€‹Security Breach: Despite being a large agency, a major lapse in security protocols.
โ€‹Offline Storage Fail: This incident shows that if credentials are not safe, even "offline" storage is at risk.
โ€‹๐Ÿ’ก What Lesson Do We Learn?
โ€‹If a government agency with layered security can fall victim to phishing, how safe are you and I?
โ€‹Never click on suspicious links.
โ€‹Always double-check that the website is genuine.
โ€‹Itโ€™s time to globally rethink institutional custody and security rules.
โ€‹Do you think there is a better way to store seized crypto? Share your thoughts in the comments! ๐Ÿ‘‡
โ€‹#SouthKoreaSeizedBTCLoss #BTC #CryptoSecurity #PhishingAttack #BlockchainNews #GwangjuNews #CryptoSafety$BTC
ยท
--
Bearish
South Korea Reports Loss of $48 Million in Seized Bitcoin Following Phishing Attack A routine audit at the Gwangju District Prosecutorsโ€™ Office uncovered the theft of approximately 70 billion won ($48 million USD) in seized Bitcoin. The breach occurred after a government employee fell victim to a phishing scam, compromising the credentials to the official wallet. Key Details: ยท Method: An employee was tricked into entering wallet credentials on a fraudulent website. ยท Assets: The stolen Bitcoin was part of assets seized and held by the prosecution service. ยท Discovery: The loss was identified during a standard internal audit procedure. ยท Status: An investigation is active, focusing on tracing the stolen funds. Broader Implications: This incident underscores critical vulnerabilities in how governments and institutions secure seized digital assets. It highlights that offline ("cold") storage solutions are only as secure as their access protocols. The event is prompting urgent reassessment of: ยท Digital asset custody standards for public institutions. ยท Security training to prevent social engineering attacks. ยท Potential regulatory frameworks for managing seized cryptocurrency. Authorities continue their investigation into the theft. #SouthKorea #CryptoSecurity #PhishingAttack #Bitcoin #Regulation $BTC {future}(BTCUSDT)
South Korea Reports Loss of $48 Million in Seized Bitcoin Following Phishing Attack

A routine audit at the Gwangju District Prosecutorsโ€™ Office uncovered the theft of approximately 70 billion won ($48 million USD) in seized Bitcoin. The breach occurred after a government employee fell victim to a phishing scam, compromising the credentials to the official wallet.

Key Details:

ยท Method: An employee was tricked into entering wallet credentials on a fraudulent website.
ยท Assets: The stolen Bitcoin was part of assets seized and held by the prosecution service.
ยท Discovery: The loss was identified during a standard internal audit procedure.
ยท Status: An investigation is active, focusing on tracing the stolen funds.

Broader Implications:
This incident underscores critical vulnerabilities in how governments and institutions secure seized digital assets. It highlights that offline ("cold") storage solutions are only as secure as their access protocols. The event is prompting urgent reassessment of:
ยท Digital asset custody standards for public institutions.
ยท Security training to prevent social engineering attacks.
ยท Potential regulatory frameworks for managing seized cryptocurrency.

Authorities continue their investigation into the theft.

#SouthKorea #CryptoSecurity #PhishingAttack #Bitcoin #Regulation
$BTC
Cardano phishing attack warning: Scammers are distributing fake 'Eternl Desktop' wallet announcements to trick users into downloading an MSI file that contains remote control tools. The malicious campaign impersonates official communications and mentions NIGHT and ATMA token incentives. The attackers use the domain download.eternldesktop.network to host unsigned installation packages. Security researchers found the file includes the LogMeIn Resolve component, allowing remote command execution and persistent system control. Only download wallet software from official sources. #Cardano #PhishingAttack #CryptoSecurity #EternlDesktop #CyberSecurity $ADA {spot}(ADAUSDT)
Cardano phishing attack warning: Scammers are distributing fake 'Eternl Desktop' wallet announcements to trick users into downloading an MSI file that contains remote control tools. The malicious campaign impersonates official communications and mentions NIGHT and ATMA token incentives. The attackers use the domain download.eternldesktop.network to host unsigned installation packages. Security researchers found the file includes the LogMeIn Resolve component, allowing remote command execution and persistent system control. Only download wallet software from official sources.

#Cardano #PhishingAttack #CryptoSecurity #EternlDesktop #CyberSecurity $ADA
ยท
--
Article
๐Ÿšจ $48 MILLION GONE IN A CLICK โ€” SOUTH KOREAโ€™S BITCOIN BLUNDER ๐Ÿšจ#SouthKoreaSeizedBTCLoss South Korea has just suffered a staggering $48M loss in seized Bitcoinโ€”and it didnโ€™t happen through a hack on the blockchain. It happened through a phishing scam ๐Ÿ˜ฌ Hereโ€™s what went wrong ๐Ÿ‘‡ ๐Ÿ’ป A fake website fooled a government employee ๐Ÿ”‘ Wallet credentials were compromised ๐Ÿ’ฐ ~70 billion won in BTC vanishedโ€”just like that The breach surfaced during a routine audit at the Gwangju District Prosecutorsโ€™ Office, exposing uncomfortable truths about how state-held crypto is actually protected. This isnโ€™t just a financial lossโ€”itโ€™s a global wake-up call ๐Ÿ”” โ€œOfflineโ€ storage isnโ€™t invincible. Human error is still the weakest link. And governments are not immune to basic crypto security failures. ๐Ÿ” Authorities are now racing to trace the missing BTC ๐Ÿ“‰ Markets are paying attention โš–๏ธ Regulators may be forced to rethink custody standards for seized digital assets If governments can lose Bitcoin to phishingโ€ฆ whoโ€™s really safe? #CryptoSecurity #Bitcoin #PhishingAttack $BTC {future}(BTCUSDT) $BNB {future}(BNBUSDT) Follow RJCryptoX for real-time alerts.

๐Ÿšจ $48 MILLION GONE IN A CLICK โ€” SOUTH KOREAโ€™S BITCOIN BLUNDER ๐Ÿšจ

#SouthKoreaSeizedBTCLoss South Korea has just suffered a staggering $48M loss in seized Bitcoinโ€”and it didnโ€™t happen through a hack on the blockchain. It happened through a phishing scam ๐Ÿ˜ฌ
Hereโ€™s what went wrong ๐Ÿ‘‡
๐Ÿ’ป A fake website fooled a government employee
๐Ÿ”‘ Wallet credentials were compromised
๐Ÿ’ฐ ~70 billion won in BTC vanishedโ€”just like that
The breach surfaced during a routine audit at the Gwangju District Prosecutorsโ€™ Office, exposing uncomfortable truths about how state-held crypto is actually protected.
This isnโ€™t just a financial lossโ€”itโ€™s a global wake-up call ๐Ÿ””
โ€œOfflineโ€ storage isnโ€™t invincible.
Human error is still the weakest link.
And governments are not immune to basic crypto security failures.
๐Ÿ” Authorities are now racing to trace the missing BTC
๐Ÿ“‰ Markets are paying attention
โš–๏ธ Regulators may be forced to rethink custody standards for seized digital assets
If governments can lose Bitcoin to phishingโ€ฆ whoโ€™s really safe?
#CryptoSecurity #Bitcoin #PhishingAttack
$BTC
$BNB

Follow RJCryptoX for real-time alerts.
ยท
--
Article
TON-Based Wallet Dryer Shuts Down and Shifts Focus to BitcoinA wallet drainer operating on The Open Network (TON) blockchain has announced it is ceasing operations due to a lack of large investors (so-called "whales") in the network. Service Shutdown and User Redirection On October 7, an announcement was made by the TON-based wallet drainer, stating that it is officially shutting down and recommending its users move to another cryptocurrency draining service. Scam Sniffer, a Web3 platform focused on anti-fraud protection, shared a screenshot of this announcement. The #hackers explained that the lack of large investors in the TON ecosystem was the reason for the shutdown: "Since TON has no whales and the community is small, we are closing down." The announcement also urged users to switch to draining #bitcoinโ˜€๏ธ instead of TON, claiming that those who enjoyed draining on TON would "love" draining #BTCโ˜€ as well. New Focus and Departure from TON ( #Toncoin ) The wallet drainer directed its users to another service and announced that the TON-based draining system would not return. Back in June, some drainers had started focusing more on the TON ecosystem. Raz Niv, co-founder of Blockaid, noted that the amount of value flowing through TON had attracted the attention of more drainers. Fake Transactions as a Trap for Users One trick used by TON drainers involved fake transactions of 5,000 USDT. This scam exploited TONโ€™s comment feature, which allows transfers to include custom messages, effectively masking the real purpose of signatures. Users were lured by messages such as "Receive 5,000 USDT" and a "Confirm" button, but once the transaction was signed, the tokens began to be drained. Losses Due to Phishing Scam Sniffer reported that similar scams in May resulted in the loss of 22,000 toncoins, which were worth over $150,000 at the time. Additionally, data shows that approximately 10,800 people fell victim to #phishingattack in September, with around $46.6 million in digital assets lost that month. The largest portion of these losses came from a single phishing transaction, which drained over $32 million in cryptocurrencies. phising attack trick crypto holders into linking their wallets to fraudulent services like drainers, allowing malicious actors to withdraw their victim's funds without further verification. Stay one step ahead โ€“ follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ ย 

TON-Based Wallet Dryer Shuts Down and Shifts Focus to Bitcoin

A wallet drainer operating on The Open Network (TON) blockchain has announced it is ceasing operations due to a lack of large investors (so-called "whales") in the network.
Service Shutdown and User Redirection
On October 7, an announcement was made by the TON-based wallet drainer, stating that it is officially shutting down and recommending its users move to another cryptocurrency draining service. Scam Sniffer, a Web3 platform focused on anti-fraud protection, shared a screenshot of this announcement. The #hackers explained that the lack of large investors in the TON ecosystem was the reason for the shutdown:
"Since TON has no whales and the community is small, we are closing down."
The announcement also urged users to switch to draining #bitcoinโ˜€๏ธ instead of TON, claiming that those who enjoyed draining on TON would "love" draining #BTCโ˜€ as well.
New Focus and Departure from TON ( #Toncoin )
The wallet drainer directed its users to another service and announced that the TON-based draining system would not return. Back in June, some drainers had started focusing more on the TON ecosystem. Raz Niv, co-founder of Blockaid, noted that the amount of value flowing through TON had attracted the attention of more drainers.
Fake Transactions as a Trap for Users
One trick used by TON drainers involved fake transactions of 5,000 USDT. This scam exploited TONโ€™s comment feature, which allows transfers to include custom messages, effectively masking the real purpose of signatures. Users were lured by messages such as "Receive 5,000 USDT" and a "Confirm" button, but once the transaction was signed, the tokens began to be drained.
Losses Due to Phishing
Scam Sniffer reported that similar scams in May resulted in the loss of 22,000 toncoins, which were worth over $150,000 at the time. Additionally, data shows that approximately 10,800 people fell victim to #phishingattack in September, with around $46.6 million in digital assets lost that month. The largest portion of these losses came from a single phishing transaction, which drained over $32 million in cryptocurrencies.
phising attack trick crypto holders into linking their wallets to fraudulent services like drainers, allowing malicious actors to withdraw their victim's funds without further verification.

Stay one step ahead โ€“ follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ

ย 
This screenshot, is one of the most dangerous thing in web3 right now. Don't know why? Let me explain... This is the preferred method that Discord phishers are using lately. It is a pop up window, it looks like one your browser made, but it isn't. It is javascript, and you never left the webpage they sent you to. Usually fake Discord verification bot page. Entering your Discord information on this page will not send it to Discord, it is sending it straight to the attacker. totp 2FA will not save you (a security key here probably would save you.) This Browser-in-the-Browser attack is easy to foil, here's how you protect yourself: NEVER SIGN INTO ANY SERVICE THAT POPS UP IN A NEW WINDOW FROM A LINK. Close the pop up, open a new browser window. Navigate to the service yourself. Log in there. That's it, do that every time. This can apply to crypto too. Never sign a txn that pops up after clicking a link someone sent you. #Hackers #phishingattack #BitEagleNews
This screenshot, is one of the most dangerous thing in web3 right now.

Don't know why? Let me explain...

This is the preferred method that Discord phishers are using lately.

It is a pop up window, it looks like one your browser made, but it isn't.

It is javascript, and you never left the webpage they sent you to. Usually fake Discord verification bot page.

Entering your Discord information on this page will not send it to Discord, it is sending it straight to the attacker.

totp 2FA will not save you (a security key here probably would save you.)

This Browser-in-the-Browser attack is easy to foil, here's how you protect yourself:

NEVER SIGN INTO ANY SERVICE THAT POPS UP IN A NEW WINDOW FROM A LINK.

Close the pop up, open a new browser window. Navigate to the service yourself. Log in there.

That's it, do that every time. This can apply to crypto too. Never sign a txn that pops up after clicking a link someone sent you.

#Hackers #phishingattack #BitEagleNews
ยท
--
๐Ÿ“‰ #SouthKoreaSeizedBTCLoss โ€” South Korean Prosecutors Lose Tens of Millions in Seized Bitcoin! ๐Ÿ‡ฐ๐Ÿ‡ท๐Ÿ’ธ In a shocking development for the crypto world, authorities in South Koreaโ€™s Gwangju District Prosecutorsโ€™ Office have revealed that a huge amount of seized Bitcoin has gone missing while in state custody. Officials discovered the loss during a routine internal inspection of confiscated digital assets. ๐Ÿ” What Happened? โ€ข About 70โ€ฏbillionโ€ฏwon (~$47โ€ฏโ€“โ€ฏ48โ€ฏmillion USD) worth of Bitcoin that had been seized from criminal cases disappeared. โ€ข Prosecutors believe the loss occurred after someone mistakenly accessed a phishing website, which exposed private key credentials stored on USB drives. Once the credentials were exposed, the BTC was irreversibly transferred out. โ€ข The exact amount and destination of the stolen Bitcoin have not been officially confirmed, and the investigation is ongoing. โš ๏ธ Why This Matters This incident highlights security challenges even for official state custody of digital assets โ€” if law enforcement can fall victim to a phishing attack, it raises questions about broader institutional readiness to manage cryptocurrencies securely. Officials are working to trace the missing funds and are reviewing custody procedures, but thereโ€™s currently no public clarity on recovery or accountability. ๐Ÿ” Takeaway for Crypto Users This story reinforces something the crypto community already knows: security practices matter hugely, whether youโ€™re an individual or an institution. #bitcoin #phishingattack #CryptoSecurity $BTC {spot}(BTCUSDT) $BNB {spot}(BNBUSDT)
๐Ÿ“‰ #SouthKoreaSeizedBTCLoss โ€” South Korean Prosecutors Lose Tens of Millions in Seized Bitcoin! ๐Ÿ‡ฐ๐Ÿ‡ท๐Ÿ’ธ

In a shocking development for the crypto world, authorities in South Koreaโ€™s Gwangju District Prosecutorsโ€™ Office have revealed that a huge amount of seized Bitcoin has gone missing while in state custody. Officials discovered the loss during a routine internal inspection of confiscated digital assets.

๐Ÿ” What Happened?
โ€ข About 70โ€ฏbillionโ€ฏwon (~$47โ€ฏโ€“โ€ฏ48โ€ฏmillion USD) worth of Bitcoin that had been seized from criminal cases disappeared.

โ€ข Prosecutors believe the loss occurred after someone mistakenly accessed a phishing website, which exposed private key credentials stored on USB drives. Once the credentials were exposed, the BTC was irreversibly transferred out.

โ€ข The exact amount and destination of the stolen Bitcoin have not been officially confirmed, and the investigation is ongoing.

โš ๏ธ Why This Matters
This incident highlights security challenges even for official state custody of digital assets โ€” if law enforcement can fall victim to a phishing attack, it raises questions about broader institutional readiness to manage cryptocurrencies securely.

Officials are working to trace the missing funds and are reviewing custody procedures, but thereโ€™s currently no public clarity on recovery or accountability.

๐Ÿ” Takeaway for Crypto Users
This story reinforces something the crypto community already knows: security practices matter hugely, whether youโ€™re an individual or an institution.
#bitcoin #phishingattack #CryptoSecurity
$BTC
$BNB
Malware vendor Inferno Drainer has announced that it has ceased operations #InfernoDrainer Drainer, a cryptocurrency theft software provider, has closed its operations. According to the developers, this year $80 million worth of cryptoassets were stolen using Inferno Drainer. According to the statement, all files, servers and infrastructure needed to run the malware will not be destroyed and will remain active. The Inferno Drainer team deleted their Telegram account and warned their "customers" not to trust other services that might use a similar name. "It was a long journey. But, unfortunately, nothing lasts forever. Thank you very much to everyone who worked with us. We hope you'll remember us as the best phishing site builder ever," Inferno Drainer's statement reads. Inferno Drainer gained popularity earlier this year and became widely used by attackers after the Monkey Drainer service was shut down. Like its predecessor, Inferno Drainer offered its software to empty cryptocurrency wallets, receiving a commission of 20% of the stolen funds. According to analytics platform Web3 Scam Sniffer, nearly $70 million has been stolen from more than 100,000 victims since February 2023 using Inferno Drainer. However, according to the estimates of the Inferno Drainer team, the stolen crypto assets are valued at more than $80 million. Recently, phishers often use the Google Ads contextual advertising service. According to platform #ScamSniffer , in April, users lost about $4 million on Google Ads-advertised phishing cryptocurrency sites. #radionovcrypto #phishingattack #BTC
Malware vendor Inferno Drainer has announced that it has ceased operations

#InfernoDrainer Drainer, a cryptocurrency theft software provider, has closed its operations. According to the developers, this year $80 million worth of cryptoassets were stolen using Inferno Drainer. According to the statement, all files, servers and infrastructure needed to run the malware will not be destroyed and will remain active. The Inferno Drainer team deleted their Telegram account and warned their "customers" not to trust other services that might use a similar name. "It was a long journey. But, unfortunately, nothing lasts forever. Thank you very much to everyone who worked with us. We hope you'll remember us as the best phishing site builder ever," Inferno Drainer's statement reads. Inferno Drainer gained popularity earlier this year and became widely used by attackers after the Monkey Drainer service was shut down. Like its predecessor, Inferno Drainer offered its software to empty cryptocurrency wallets, receiving a commission of 20% of the stolen funds. According to analytics platform Web3 Scam Sniffer, nearly $70 million has been stolen from more than 100,000 victims since February 2023 using Inferno Drainer. However, according to the estimates of the Inferno Drainer team, the stolen crypto assets are valued at more than $80 million. Recently, phishers often use the Google Ads contextual advertising service. According to platform #ScamSniffer , in April, users lost about $4 million on Google Ads-advertised phishing cryptocurrency sites.

#radionovcrypto #phishingattack #BTC
Article
Breaking: Alleged Phishing Attack on #SAVM Whale - OnChain Analysis1/ ๐Ÿšจ Breaking: Alleged Phishing Attack on #SAVM Whale ๐Ÿšจ ๐Ÿ”— Ongoing Outflow ๐ŸŒ Address: 0x0c008e6479a83be6a6c49d95c2029a6064136688 ๐Ÿ’ผ Token: SatoshiVM | Amount: 193.676K ๐Ÿ’ฐ Transaction: $2.55M | Price: $0.215 ๐Ÿ—“๏ธ Jan 25, 20:57 ๐Ÿ” Details: Whale 0x0c0 transferred out 193,676 SAVM to two addresses, 0xea5 and 0x406. Allegedly, the whale fell victim to a phishing attack, leading to the transfer of all SAVM to these addresses. ๐Ÿ’ธ Profit Turned Loss: In the past 11 hours, the SAVM tokens were sold for only 437 ETH ($892K) by the two receivers. The SAVM price plummeted by 48.39% in the last 24 hours. ๐Ÿ›ก๏ธ Stay Alert: This incident highlights the vulnerability of large holders to phishing attacks. The immediate sell-off and drop in SAVM price emphasize the market impact. ๐Ÿ“Š Market Impact: Traders and investors should monitor the fallout from this event. The sudden sell-off could create uncertainty and impact the broader market sentiment. 2/ ๐Ÿ”„ Understanding the Alleged Phishing Attack The whale, 0x0c0, bought 193,676 SAVM with 2.1M USDT in the last 2 days. The phishing attack resulted in the transfer of all acquired SAVM to addresses 0xea5 and 0x406 (Fake_Phishing276021). ๐ŸŒ SAVM Sell-Off: The quick sell-off of the acquired SAVM raises questions about the security measures in place and the impact on the token's value. ๐Ÿ’ป Lessons Learned: This incident serves as a reminder for the crypto community to prioritize security measures, including two-factor authentication and vigilant fund management. 3/ ๐Ÿ“ˆ Moving Forward: Impact on SAVM and Community As the market reacts to this alleged phishing attack, considerations for SAVM and the broader community include: ๐Ÿš€ SAVM Project: The SAVM project's response to the incident will be crucial. Communication and transparency will be key in maintaining community trust. ๐Ÿ“‰ Community Sentiment: Watch for shifts in community sentiment. Traders and investors may react to the news, potentially influencing market dynamics. ๐Ÿ›ก๏ธ Security Measures: Evaluate security measures implemented by projects and individual holders. A focus on enhancing security practices is imperative. ๐Ÿ“ˆ๐Ÿ“‰ #cryptonews #SAVM #phishingattack #CryptoSecurityIssue (Note: This information is for educational purposes only. Conduct thorough research and seek professional advice before making investment decisions.)

Breaking: Alleged Phishing Attack on #SAVM Whale - OnChain Analysis

1/ ๐Ÿšจ Breaking: Alleged Phishing Attack on #SAVM Whale ๐Ÿšจ
๐Ÿ”— Ongoing Outflow
๐ŸŒ Address: 0x0c008e6479a83be6a6c49d95c2029a6064136688
๐Ÿ’ผ Token: SatoshiVM | Amount: 193.676K
๐Ÿ’ฐ Transaction: $2.55M | Price: $0.215
๐Ÿ—“๏ธ Jan 25, 20:57
๐Ÿ” Details:
Whale 0x0c0 transferred out 193,676 SAVM to two addresses, 0xea5 and 0x406. Allegedly, the whale fell victim to a phishing attack, leading to the transfer of all SAVM to these addresses.
๐Ÿ’ธ Profit Turned Loss: In the past 11 hours, the SAVM tokens were sold for only 437 ETH ($892K) by the two receivers. The SAVM price plummeted by 48.39% in the last 24 hours.
๐Ÿ›ก๏ธ Stay Alert: This incident highlights the vulnerability of large holders to phishing attacks. The immediate sell-off and drop in SAVM price emphasize the market impact.
๐Ÿ“Š Market Impact: Traders and investors should monitor the fallout from this event. The sudden sell-off could create uncertainty and impact the broader market sentiment.
2/ ๐Ÿ”„ Understanding the Alleged Phishing Attack
The whale, 0x0c0, bought 193,676 SAVM with 2.1M USDT in the last 2 days. The phishing attack resulted in the transfer of all acquired SAVM to addresses 0xea5 and 0x406 (Fake_Phishing276021).
๐ŸŒ SAVM Sell-Off: The quick sell-off of the acquired SAVM raises questions about the security measures in place and the impact on the token's value.
๐Ÿ’ป Lessons Learned: This incident serves as a reminder for the crypto community to prioritize security measures, including two-factor authentication and vigilant fund management.
3/ ๐Ÿ“ˆ Moving Forward: Impact on SAVM and Community
As the market reacts to this alleged phishing attack, considerations for SAVM and the broader community include:
๐Ÿš€ SAVM Project: The SAVM project's response to the incident will be crucial. Communication and transparency will be key in maintaining community trust.
๐Ÿ“‰ Community Sentiment: Watch for shifts in community sentiment. Traders and investors may react to the news, potentially influencing market dynamics.
๐Ÿ›ก๏ธ Security Measures: Evaluate security measures implemented by projects and individual holders. A focus on enhancing security practices is imperative.
๐Ÿ“ˆ๐Ÿ“‰ #cryptonews #SAVM #phishingattack #CryptoSecurityIssue
(Note: This information is for educational purposes only. Conduct thorough research and seek professional advice before making investment decisions.)
ยท
--
Article
Phishing Attack And How Does It Work?What Is Phishing Attack? Phishing stands out as one of the most prevalent and widespread cyber attack techniques. This form of assault falls under the umbrella of social engineering attacks, relying on psychological manipulation and exploiting human vulnerabilities. At its core, a phishing attack unfolds when a malicious actor assumes the identity of a trustworthy entity or business to deceive individuals and extract sensitive information, including credit card details, usernames, and passwords. Typically, phishing attacks unfold through deceptive emails crafted to persuade users to access a fraudulent website. These emails commonly prompt users to reset passwords or verify credit card information, leading them to a counterfeit website that closely mimics the legitimate one. The primary variants of phishing include clone phishing, spear phishing, and pharming. How Does It Work? You might encounter an email urging you to visit a seemingly familiar website. However, this website is deceptive, and when you log in, you unwittingly furnish your credentials to the attacker. Other phishing tactics may involve concocted narratives and appeals for money, exemplified by infamous scams like the โ€œNigerian Princeโ€ email scheme. In the realm of cryptocurrency, phishing techniques have extended to stealing digital assets. For instance, a cybercriminal might craft a fraudulent replica of a website, altering the merchantโ€™s wallet address to their own. This manipulation tricks users into making payments for a service that appears legitimate but is, in reality, a scam. Recognizing and understanding phishing scams is crucial to avoid falling victim to them. Some scams exhibit high levels of sophistication, and a single unsuspecting click or a careless keystroke could result in significant losses. Stay vigilant to protect yourself from these evolving threats. #Webgtr #phishingattack #BinanceTournament #BTC #etf

Phishing Attack And How Does It Work?

What Is Phishing Attack?
Phishing stands out as one of the most prevalent and widespread cyber attack techniques. This form of assault falls under the umbrella of social engineering attacks, relying on psychological manipulation and exploiting human vulnerabilities. At its core, a phishing attack unfolds when a malicious actor assumes the identity of a trustworthy entity or business to deceive individuals and extract sensitive information, including credit card details, usernames, and passwords.
Typically, phishing attacks unfold through deceptive emails crafted to persuade users to access a fraudulent website. These emails commonly prompt users to reset passwords or verify credit card information, leading them to a counterfeit website that closely mimics the legitimate one. The primary variants of phishing include clone phishing, spear phishing, and pharming.
How Does It Work?
You might encounter an email urging you to visit a seemingly familiar website. However, this website is deceptive, and when you log in, you unwittingly furnish your credentials to the attacker. Other phishing tactics may involve concocted narratives and appeals for money, exemplified by infamous scams like the โ€œNigerian Princeโ€ email scheme.
In the realm of cryptocurrency, phishing techniques have extended to stealing digital assets. For instance, a cybercriminal might craft a fraudulent replica of a website, altering the merchantโ€™s wallet address to their own. This manipulation tricks users into making payments for a service that appears legitimate but is, in reality, a scam.
Recognizing and understanding phishing scams is crucial to avoid falling victim to them. Some scams exhibit high levels of sophistication, and a single unsuspecting click or a careless keystroke could result in significant losses. Stay vigilant to protect yourself from these evolving threats.
#Webgtr #phishingattack #BinanceTournament #BTC #etf
ยท
--
Bearish
@lookonchain Someone lost 12,083.6 $spWETH (worth $32.33M)! due to a #phishing attack! According to #ArkhamIntel , the wallet may be related to DiscusFish (@bitfish1). To avoid being phished, please do not click on any unknown links and do not sign any unknown signatures. Always double-check when signing signatures. (trxn# 0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb) #phishingattack
@lookonchain

Someone lost 12,083.6 $spWETH (worth $32.33M)! due to a #phishing attack!

According to #ArkhamIntel , the wallet may be related to DiscusFish (@bitfish1).

To avoid being phished, please do not click on any unknown links and do not sign any unknown signatures.
Always double-check when signing signatures.
(trxn# 0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb)
#phishingattack
User suffered a loss of more than $629,000 in Aave WETH due to phishing transactions ๐Ÿ˜ฑ๐Ÿ’ธ $XRP $BNB $SOL According to Odaily, a user has suffered a huge financial loss due to multiple phishing transactions. According to Scam Sniffer monitoring, this user incurred a loss of $629,812 in Aave WETH, which is approximately equal to 225.08 aEthWETH and 2 Doodle tokens! ๐Ÿšจ๐Ÿ’ฅ This is a warning for all crypto users to be careful of phishing scams, and always monitor your transactions carefully. ๐Ÿ”’๐Ÿ” #CryptoScams #PhishingAttack #AaveWETH
User suffered a loss of more than $629,000 in Aave WETH due to phishing transactions ๐Ÿ˜ฑ๐Ÿ’ธ
$XRP $BNB $SOL

According to Odaily, a user has suffered a huge financial loss due to multiple phishing transactions. According to Scam Sniffer monitoring, this user incurred a loss of $629,812 in Aave WETH, which is approximately equal to 225.08 aEthWETH and 2 Doodle tokens! ๐Ÿšจ๐Ÿ’ฅ

This is a warning for all crypto users to be careful of phishing scams, and always monitor your transactions carefully. ๐Ÿ”’๐Ÿ”

#CryptoScams #PhishingAttack #AaveWETH
โ€ขNEW PHISHING THREATS. -Phishing groups are launching new attacks using Google subdomains to trick users into revealing their passwords. -Yu Xian, founder of Slow Mist, reported that the chief developer of ENS fell victim to a phishing scheme that exploited a vulnerability in Google's infrastructure. -The attack emails appeared legitimate and passed DKIM verification, leading users to a fake support portal. DO NOT trust unknown emails and always keep your personal data as protected as possible. Your cryptocurrencies may be threatened by this new type of attack. {spot}(BTCUSDT) {spot}(BNBUSDT) #criptonews #bnb #phishingattack #phishing $BTC $BNB
โ€ขNEW PHISHING THREATS.

-Phishing groups are launching new attacks using Google subdomains to trick users into revealing their passwords.

-Yu Xian, founder of Slow Mist, reported that the chief developer of ENS fell victim to a phishing scheme that exploited a vulnerability in Google's infrastructure.

-The attack emails appeared legitimate and passed DKIM verification, leading users to a fake support portal.

DO NOT trust unknown emails and always keep your personal data as protected as possible. Your cryptocurrencies may be threatened by this new type of attack.


#criptonews #bnb #phishingattack #phishing $BTC $BNB
Login to explore more contents
Join global crypto users on Binance Square
โšก๏ธ Get latest and useful information about crypto.
๐Ÿ’ฌ Trusted by the worldโ€™s largest crypto exchange.
๐Ÿ‘ Discover real insights from verified creators.
Email / Phone number