You need to login in order to Like
By Sandeep Kasalkar
As in life, so in crypto: The originals are always less in number than the fakes! We have learnt here about so many phishing types but since the fakes far outnumber the originals, we still have some more to tell you about. So, here we go!
Fake Browser Extensions
These extensions are malicious plugins that have been made to look like trustworthy ones. They are frequently employed to steal private data, including credit card numbers and login information. They can also display unwanted adverts, infect computers with malware, or send victims to phoney websites.
Most of the time, rogue websites or phishing emails are used to spread fake browser extensions. They could be challenging to take down once placed. The extensions essentially act as phishing sites for sensitive data including private keys, mnemonic phrases, and Keystore files.
Ice Phishing
The attacker will email the victim a false transaction that appears to be from a reliable source in this type of phishing. The victim will have to sign the transaction using their private key.
In other words, the victim is made to sign a transaction that gives the fraudster control over their tokens. If the victim continues, they will inadvertently have given the attacker possession of their tokens.
Crypto-Malware Attack
An instance of malware known as a “crypto-malware attack” encrypts the victim’s files and requests a ransom to unlock them. Phishing emails, rogue websites, and bogus browser extensions can all spread it.
The malware will encrypt the victim’s files and show the ransom demand on their screen once it has been installed on their computer.
Watch more about the evil eye of phishing attacks here:
Link: https://youtu.be/_nVbs0YqlMw
You need to login in order to Like