Fake Bounties using Phishing - Bounties - CryptoTalk.Org Jump to content
sicattjl

Fake Bounties using Phishing

Recommended Posts

Phishing consists of the impersonation of an authority, company or even someone, in order to trick the victim into revealing their confidential information. In this way, the attacker can access your accounts or wallets and steal the funds.

We can distinguish several types of phishing used in the crypto world:

 

Cloned sites
This is the most common type. Here the scammers prepare a website identical to the legitimate one, which can be from an exchange house or online wallet to the official page of an Initial Coin Offering (ICO), and spread it through different means, including email, chats and even Google ads that can be mistaken for the original page in search results.
It is not unusual that, in the case of email and chats, the link to the fraudulent site is accompanied by some false story about the company requiring the user to log into their account. Thus, when the victim enters their credentials to enter the supposed site, what they are actually doing is giving them to the attacker.

 

The most effective way to avoid this scam is to look closely at the URL of each page where we have funds before entering any credentials. In phishing, the URL always changes in some character, since the domain (name) of the company or project is already taken and it is not possible that there are two exactly alike. In this sense, once we identify the real page, we should save it in Favorites and enter there, instead of using the search results.

This was the case with MyEtherWallet last year, while this year among the cloned sites are the popular Blockchain.info domain and the Token Bee ICO, where cybercriminals managed to steal up to $ 700,000.

 

Fake support teams
Sometimes scammers save themselves the trouble of creating the fake site by simply posing as the support team of some legitimate platform, including exchanges and wallets. In this way, the only thing they imitate are the logos and the email address of the company within the message they send to their victims to announce any alleged inconvenience and request their private information with the false purpose of helping them.

 

As the FBI's Internet Crime Complaint Center explains: "The fraudulent support requests access to the victim's virtual wallet and transfers the victim's virtual currency to another wallet for a temporary hold during maintenance. The virtual currency it is never returned to the victim, and the criminal ceases all communication. Criminals who have access to the victim's electronic device use the victim's personal information and credit card to purchase and transfer virtual money to an account controlled by the criminal ".

 

It is important to remember in these cases that both traditional financial companies and cryptocurrency platforms never ask for your credentials, under any circumstances. Simply because they already have them.

 

Phone scams or vishing (voice phishing)
In this case, the scammers do not contact you directly, but rather your phone company. After finding out your phone number and even your identification number and address thanks to a stolen invoice or because you simply published that information at some point, the attacker contacts the company to transfer your line to a new SIM card under his control.

Since the security of several telephone companies is usually quite weak in these cases, the operator will ask the attacker very little information to confirm his identity. If successful, the criminal will be able to reset all the passwords of the legitimate user using two-step authentication, that is, the code that reaches the phone and that usually serves as an extra layer of security. In this way, online wallets could be emptied in a matter of minutes, long before the rightful owner can do anything.

 

This happened to Cody Brown, who had to see his 8 thousand dollars in cryptocurrencies disappear in fifteen minutes. A similar case was that of Jered Kenna, who lost up to $ 40,000 for each day that he failed to resolve the problem with the phone company.

A similar scenario
It may also happen that the phone scam targets you. In this way, someone could contact you posing as a company, tell you a false story and not only ask for your credentials, but also urge you to deposit funds in a portfolio.

This is what happened to an elderly woman in Canada: a scammer contacted her by phone, assuring her that she was a member of the local police and that she owed a large sum in taxes, so she had to go to bitcoin ATMs to solve them . Before the fraud was discovered, the woman deposited 17 thousand dollars

 

See you in my next post

  • Useful or interesting 4
  • +1 1
  • +2 1
  • +4 4
  • +5 3

Share this post


Link to post
Share on other sites
13 minutes ago, SAMJ101 said:

Thank you very much. Good article. I have more than 20 Emails that are begging me to click a button in HTML page.

The hacker claims it is the support team's Email. and ask me to enter my pass.

But he/she doesn't know there is a big mistake in this cheating plan.

 

I recommend, delete and block this email user. He/She is a Scammer

  • +1 1

Share this post


Link to post
Share on other sites

Of course, there are many fake bounties from phishing websites. We should be very careful about this and make sure we make research on each bounty before we participate on them. Many people have been scammed by this trick.

  • Useful or interesting 2
  • +1 1

Time is the ultimate weapon!

Share this post


Link to post
Share on other sites

There are many fraud methods on the Internet, and in fact, unfortunately, many beginners in this field fall into them, and the loss is great at some times, and the legal authorities must put an end to them. We have fallen into many fraudsters like them, unfortunately.

  • Useful or interesting 2
  • +4 1

Share this post


Link to post
Share on other sites

These persons through fraudulent emails or posts let people enter thier sensitive information on a site through which your wallet can be hacked easily and you lose your money.

  • Useful or interesting 2

                                                    BetFury                                                   

🐥Twitter | 📩Telegram | 🎲 You play - We pay 🎲 | YouTube 🍿| Reddit  🕹

                                                  Free BTC 1 800 Satoshi every day                                               

Share this post


Link to post
Share on other sites

Thank you for the very interesting information, now there are really a lot of scammers, I constantly notice fake emails in the mail, so you should always be careful and not fall for the tricks of scammers

  • Useful or interesting 1

Share this post


Link to post
Share on other sites

Great post mate, extensively explained.

Fake bounties are everywhere. The need to be very clever when dealing with each and every random bounties cannot be over talked about. I take on bounties but when it comes to releasing personal information, clicking on links and downloads, I am extra careful. In fact, hunting bounties is advised to be done separately from platforms you use in accessing wallets and exchanges.

  • Useful or interesting 1

My Altcointalks username —° Raqeebzy

 

Share this post


Link to post
Share on other sites

Good day. read your article and find it very helpful. Recently, there have been a lot of fake airdrops that not only gain an audience, but also steal payment data. Thank you for bringing up such important topics. Good luck to you!

Share this post


Link to post
Share on other sites

Fake bounties are a big risk as they can introduce phishing to your wallet. They make you click on suspicious links then ask about your sensitive information to enter your private online space.

  • Useful or interesting 1

Share this post


Link to post
Share on other sites
On 10/5/2020 at 9:16 PM, sicattjl said:

Phishing consists of the impersonation of an authority, company or even someone, in order to trick the victim into revealing their confidential information. In this way, the attacker can access your accounts or wallets and steal the funds.

We can distinguish several types of phishing used in the crypto world:

 

Cloned sites
This is the most common type. Here the scammers prepare a website identical to the legitimate one, which can be from an exchange house or online wallet to the official page of an Initial Coin Offering (ICO), and spread it through different means, including email, chats and even Google ads that can be mistaken for the original page in search results.
It is not unusual that, in the case of email and chats, the link to the fraudulent site is accompanied by some false story about the company requiring the user to log into their account. Thus, when the victim enters their credentials to enter the supposed site, what they are actually doing is giving them to the attacker.

 

The most effective way to avoid this scam is to look closely at the URL of each page where we have funds before entering any credentials. In phishing, the URL always changes in some character, since the domain (name) of the company or project is already taken and it is not possible that there are two exactly alike. In this sense, once we identify the real page, we should save it in Favorites and enter there, instead of using the search results.

This was the case with MyEtherWallet last year, while this year among the cloned sites are the popular Blockchain.info domain and the Token Bee ICO, where cybercriminals managed to steal up to $ 700,000.

 

Fake support teams
Sometimes scammers save themselves the trouble of creating the fake site by simply posing as the support team of some legitimate platform, including exchanges and wallets. In this way, the only thing they imitate are the logos and the email address of the company within the message they send to their victims to announce any alleged inconvenience and request their private information with the false purpose of helping them.

 

As the FBI's Internet Crime Complaint Center explains: "The fraudulent support requests access to the victim's virtual wallet and transfers the victim's virtual currency to another wallet for a temporary hold during maintenance. The virtual currency it is never returned to the victim, and the criminal ceases all communication. Criminals who have access to the victim's electronic device use the victim's personal information and credit card to purchase and transfer virtual money to an account controlled by the criminal ".

 

It is important to remember in these cases that both traditional financial companies and cryptocurrency platforms never ask for your credentials, under any circumstances. Simply because they already have them.

 

Phone scams or vishing (voice phishing)
In this case, the scammers do not contact you directly, but rather your phone company. After finding out your phone number and even your identification number and address thanks to a stolen invoice or because you simply published that information at some point, the attacker contacts the company to transfer your line to a new SIM card under his control.

Since the security of several telephone companies is usually quite weak in these cases, the operator will ask the attacker very little information to confirm his identity. If successful, the criminal will be able to reset all the passwords of the legitimate user using two-step authentication, that is, the code that reaches the phone and that usually serves as an extra layer of security. In this way, online wallets could be emptied in a matter of minutes, long before the rightful owner can do anything.

 

This happened to Cody Brown, who had to see his 8 thousand dollars in cryptocurrencies disappear in fifteen minutes. A similar case was that of Jered Kenna, who lost up to $ 40,000 for each day that he failed to resolve the problem with the phone company.

A similar scenario
It may also happen that the phone scam targets you. In this way, someone could contact you posing as a company, tell you a false story and not only ask for your credentials, but also urge you to deposit funds in a portfolio.

This is what happened to an elderly woman in Canada: a scammer contacted her by phone, assuring her that she was a member of the local police and that she owed a large sum in taxes, so she had to go to bitcoin ATMs to solve them . Before the fraud was discovered, the woman deposited 17 thousand dollars

 

See you in my next post

Thank you for your information, indeed this a good article, one will know how to take care of such kind of issues

  • Useful or interesting 1

Share this post


Link to post
Share on other sites

Unfortunately, we always come across fake rewards on the internet, especially using phishing. The points you have stated in your article are really important and real. However, in addition to individuals and the state, there are important duties and responsibilities especially for certain platforms. Because there have been many victimizations related to this until today. So please, let's all be careful about this.

Share this post


Link to post
Share on other sites

Phishing is one of the common and most used techniques used by hackers. Phishing is the layout of any famous program where you have to put your secret passwords. Please be aware and before logging in verify it. In short, I would suggest everyone have a good knowledge of how to prevent hacking. Thanks for the useful information that you provide as it will help members of this forum to prevent from being hacked

Share this post


Link to post
Share on other sites

On one occasion when they launched a previous yobit airdrop, something like this happened on a pirate cryptotalk platform that was sending messages to the different yobit users but towards your email, there were people who fell, later they warned about that problem and more further was resolved.

  • +1 1

Share this post


Link to post
Share on other sites

Pushing is just like a way where they trap u by the interface of popular websites where u have to put your security codes. So avoid them and if get such link please verify them is that belongs to actual website or not. If u become careless than u can lose all your money even personal data

Share this post


Link to post
Share on other sites

Really it's appreciated what you have write as it will all those who can be a victim of pishing and can reveal their confidential information. So be aware of those bounties compaign and if u come across any other bounties compaign than verify before revealing your secret passwords

Share this post


Link to post
Share on other sites

This is very good information indeed but reality is that you cant trust people in crypto because a lot of them will try to scam you using social engineering even if this looks like a bounty program or airdrop you are not that really safe.

Share this post


Link to post
Share on other sites

Phishing is a very common evil in the world of cryptocurrencies, we must be very careful with the links we open, the emails. To take care of us, some exchanges and banks advise that we directly enter their page with the domain, do not search for it by google, when receiving an email, let's verify its origin, and configure the email to send the unknown to the spam folder, take care of this type of scams

Share this post


Link to post
Share on other sites
On 10/5/2020 at 9:16 PM, sicattjl said:

Phishing consists of the impersonation of an authority, company or even someone, in order to trick the victim into revealing their confidential information. In this way, the attacker can access your accounts or wallets and steal the funds.

We can distinguish several types of phishing used in the crypto world:

 

Cloned sites
This is the most common type. Here the scammers prepare a website identical to the legitimate one, which can be from an exchange house or online wallet to the official page of an Initial Coin Offering (ICO), and spread it through different means, including email, chats and even Google ads that can be mistaken for the original page in search results.
It is not unusual that, in the case of email and chats, the link to the fraudulent site is accompanied by some false story about the company requiring the user to log into their account. Thus, when the victim enters their credentials to enter the supposed site, what they are actually doing is giving them to the attacker.

 

The most effective way to avoid this scam is to look closely at the URL of each page where we have funds before entering any credentials. In phishing, the URL always changes in some character, since the domain (name) of the company or project is already taken and it is not possible that there are two exactly alike. In this sense, once we identify the real page, we should save it in Favorites and enter there, instead of using the search results.

This was the case with MyEtherWallet last year, while this year among the cloned sites are the popular Blockchain.info domain and the Token Bee ICO, where cybercriminals managed to steal up to $ 700,000.

 

Fake support teams
Sometimes scammers save themselves the trouble of creating the fake site by simply posing as the support team of some legitimate platform, including exchanges and wallets. In this way, the only thing they imitate are the logos and the email address of the company within the message they send to their victims to announce any alleged inconvenience and request their private information with the false purpose of helping them.

 

As the FBI's Internet Crime Complaint Center explains: "The fraudulent support requests access to the victim's virtual wallet and transfers the victim's virtual currency to another wallet for a temporary hold during maintenance. The virtual currency it is never returned to the victim, and the criminal ceases all communication. Criminals who have access to the victim's electronic device use the victim's personal information and credit card to purchase and transfer virtual money to an account controlled by the criminal ".

 

It is important to remember in these cases that both traditional financial companies and cryptocurrency platforms never ask for your credentials, under any circumstances. Simply because they already have them.

 

Phone scams or vishing (voice phishing)
In this case, the scammers do not contact you directly, but rather your phone company. After finding out your phone number and even your identification number and address thanks to a stolen invoice or because you simply published that information at some point, the attacker contacts the company to transfer your line to a new SIM card under his control.

Since the security of several telephone companies is usually quite weak in these cases, the operator will ask the attacker very little information to confirm his identity. If successful, the criminal will be able to reset all the passwords of the legitimate user using two-step authentication, that is, the code that reaches the phone and that usually serves as an extra layer of security. In this way, online wallets could be emptied in a matter of minutes, long before the rightful owner can do anything.

 

This happened to Cody Brown, who had to see his 8 thousand dollars in cryptocurrencies disappear in fifteen minutes. A similar case was that of Jered Kenna, who lost up to $ 40,000 for each day that he failed to resolve the problem with the phone company.

A similar scenario
It may also happen that the phone scam targets you. In this way, someone could contact you posing as a company, tell you a false story and not only ask for your credentials, but also urge you to deposit funds in a portfolio.

This is what happened to an elderly woman in Canada: a scammer contacted her by phone, assuring her that she was a member of the local police and that she owed a large sum in taxes, so she had to go to bitcoin ATMs to solve them . Before the fraud was discovered, the woman deposited 17 thousand dollars

 

See you in my next post

Scammers are very claiming to be wise they like legit community, they disburse the fake identity to avoid track them out i recommend to view various attempt about the site before we trust them 

Share this post


Link to post
Share on other sites

In my opinion 

Then his email was hacked, with phishing emails sent to thousands of his contacts it's so dangerous people's that is good for way scammer and give them a strict punishment.....

Share this post


Link to post
Share on other sites

There are many fraud method on the internet and in fact unfortunately ,many beginning in this field fall into them . through which your wallet your can be hacked easily and you your money .

Share this post


Link to post
Share on other sites

Of course there are a lot of duplicate on all thes sites .they never want me to lose my account in the car .many people have been scammed by this strategy .and not fall for the stunts of con artists 

Share this post


Link to post
Share on other sites

Thanks friend for useful information . Pushing is like a way where they trap you by the interface of popular websites where you have to put your security codes. It is a good advice for all members to be avoid of such fraud and scammers. 

Share this post


Link to post
Share on other sites

There are many sites that are the scam and promotes the scam services. We should not have do the sites by joining these websites. We must have to report against these sites.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    No registered users viewing this page.

  • Topics

  • Сообщения

    • Уважаемые пользователи! Сегодня (11.06.24) целый день у сайта было техническое обслуживание, информация была продублирована на сайте за день до отключения сайта. С завтра (12.06.24) сайт продолжит свою работу в штатном режиме. Спасибо за понимание и за то, что с нами! Ждем всех за новыми обменами в нашем сервисе.
    • TON обошел Ethereum по количеству активных адресов.Хотели бы вы видеть эту криптовалюту в нашем списке направлений обменника saint.exchange ?
    • Европейское правоохранительное агентство Европол раскритиковал майнинг биткойна, а также решения второго уровня, заявив, что они создают «дополнительные проблемы для правоохранительных расследований».   В недавнем 40-страничном отчете о криптографическом шифровании агентство, базирующееся в Гааге, подчеркнуло, что майнинг криптовалют стал для преступников привлекательным методом отмывания незаконных доходов. Преступные лица могут использовать майнинговые операции для сокрытия незаконных доходов, а в некоторых случаях даже приносить преступникам дополнительную прибыль, заявляет Европол, добавляя, что подозрительная активность также была обнаружена в майнинг-пулах, особенно тех, которые эксплуатируются операторами программ-вымогателей.   Однако сам по себе майнинг криптовалют — не единственная угроза, которую Европол видит в криптоиндустрии. Европол также выразил обеспокоенность по поводу более широкого ландшафта криптовалют, подчеркнув, что растущее использование доказательств с нулевым разглашением и приложений уровня 2 в блокчейне может усложнить отслеживание средств. Агентство предупредило, что эти технологии «могут вызвать дополнительные проблемы для правоохранительных расследований», хотя и не уточнило, какие именно проблемы могут создать эти технологии масштабирования. Кроме того, в отчете признается, что задача восстановления кошелька преступника может быть «значительно усложнена» из-за стандарта SLIP39, широко известного как Shamir Backup. Этот стандарт, используемый аппаратными криптокошельками, позволяет создавать несколько общих ресурсов для восстановления вместо одной мнемонической фразы. Каждая доля восстановления состоит из 20 слов, и для восстановления кошелька требуется определенное пользователем количество этих акций, что усложняет работу правоохранительных органов, утверждают в Европол
    • ♦️По мнению американского бизнесмена, сейчас стать миллионером, открыв свой бизнес, чрезвычайно сложно. Роберт Кийосаки убеждён в том, что именно биткоин поможет быстро разбогатеть и без дополнительных усилий. 🔺Инвестор подчеркнул, что любит биткоин за то, что тот выполняет за него тяжёлую работу по заработку средств, поэтому и призывает всех покупать и хранить биткоины. 🔻Это очень распространённый аргумент, в ответ на который можно сказать следующее: каждый биткоин содержит 100 млн сатоши, и вам необязательно покупать монету целиком. Инвесторы советуют выделять посильную сумму в месяц и покупать на неё сатоши.
    • Уважаемые участники форума! Хотим уведомить Вас, что наш обменник криптовалют 01bit.pro был успешно добавлен на мониторинг Exchangesumo.com. Надеемся на долгое и плодотворное сотрудничество. Будем благодарны за отзывы.
    • Смартлаер совместно с проектом Кнайтфюри решили раздать драконов, если приходили елигбл на минт, то скоро уже сам минт через 24 часа, посмотрим что из этого выйдет:  И что-то вас @UNIQ_ и @abfin77 больше нет на форуме, есть вероятность того, что 17-го числа могут что-то выкатить по Талкам и в целом по форуму. На всякий случай приобрёл несколько млн Талк токенов.  
    • Нацбанк Грузии привлекает Ripple к оцифровке экономики   Криптокомпания Ripple планирует сотрудничать с Национальным банком Грузии по вопросу цифровизации местной экономики с помощью блокчейна. Для обсуждения этой темы с исполнительным директором Ripple Джеймсом Уоллисом встретились и.о. главы Нацбанка Грузии Натия Турнава и глава Департамента развития финансовых технологий и надзора банка Варлам Эбаноидзе.   Согласно официальному заявлению Нацбанка, на совместном мероприятии изучались потенциальные пути «сотрудничества в области финансовых технологий и цифровизации».   Это уже не первая встреча руководства Ripple с властями Грузии. В сентябре 2023 года Нацбанк пригласил компанию принять участие в проекте цифрового лари. Позднее стало известно, что фирма выбрана в качестве официального партнёра для разработки цифровой валюты центрального банка (CBDC). Помимо Грузии, Ripple участвует в пилотных проектах CBDC Центробанков Колумбии, Бутана, Пулау, Черногории и ряда других стран.   В конце 2023 года криптокомпания представила 23-страничный документ о глобальной разработке цифровой валюты центробанка. В нём Ripple заявила, что «CBDC крайне необходимы для поддержки значительного положительного воздействия токенизации активов». Источник - https://ru.investing.com/news/cryptocurrency-news/article-2432719
    • Скоро оптимисты форума, ну если такие есть в итоге смогу увидеть оживление форума или токена Талк, скорее всего 17-го числа, когда биржа спустя столько лет вдруг начали работать в направлении Изи и Юочата, может быть и про Талки не забыли.
    • Нужно обратиться к администрации форума @Bigpat, чтобы решить эту проблему.
×
×
  • Create New...