The craze of cryptocurrency that was there two years ago is no longer visible, but this does not mean that cryptocurrencies are over. Even today people are investing in cryptocurrency. Cryptocurrency is a digital asset that is under the watch of hackers 24 hours. According to a report by Checkpoint, an alert has been issued in the crypto community regarding the hacking of cryptocurrency. In this alert, it has been told in which ways hackers steal cryptocurrency. Let us know...
Campaigns and fake websites: Crypto hackers create fake websites whose names resemble currencies to break into cryptocurrency wallets. Apart from this, these hackers also run many types of online fake campaigns which they also promote through social media and e-mail.
Copy of the original website: Like regular hackers, crypto hackers also create a fake website similar to the original website of a famous crypto currency and promote it online. As soon as a user searches about that crypto currency on Google, a fake website appears first because of its promotion. In such a situation, people think that this is the real site and they get trapped in the trap.
Wallet connection request: Through these fake sites, hackers send requests to users to connect to a digital wallet and then ask them to claim the token. With the help of these connections, hackers break into the crypto accounts of users.
Abuse of the 'permit' function in ERC-20 tokens: These hackers manipulate the permit function of ERC-20 tokens and then send messages to users asking them to sign in. As soon as a user signs in, he gets his complete details. After getting an access token permit, no other access is required.
Transfer Assets: After gaining access to the wallet or account, these hackers immediately transfer the user's assets. For this, hackers use cryptocurrency mixers. Apart from this, crypto is transferred not to one or two but to many accounts.
No Tracking: Due to off-chain signing, sometimes it becomes very difficult to track them. With access to the 'permit' function, fraud detection becomes even more challenging.
PC Social media