Binance Square

phishingscam

249,040 visningar
107 diskuterar
Ledsome
--
🚨 CẢNH BÁO: ĐỪNG ĐỂ BỊ LỪA! Hiểu về Phishing trong 3 phút 🚨 Bạn có biết: Phishing là hình thức lừa đảo kỹ thuật số khi kẻ xấu giả mạo một tổ chức/tin nhắn đáng tin cậy để đánh cắp thông tin nhạy cảm của bạn. 🔍 Dấu hiệu nhận biết: URL đáng ngờ, email lạ Yêu cầu khẩn cấp/cấp bách Lỗi chính tả, ngữ pháp Đính kèm file hoặc link lạ 🎯 Các hình thức phishing phổ biến trong crypto: Email giả mạo ví, sàn giao dịch Tin nhắn Telegram/Discord giả hỗ trợ Quảng cáo airdrop, giveaway giả Ứng dụng ví giả mạo 🛡️ Cách phòng tránh: KHÔNG bao giờ chia sẻ seed phrase/private key Kiểm tra kỹ URL trước khi nhập thông tin Bật xác thực 2 lớp (2FA) Cập nhật phần mềm thường xuyên 💡 Nhớ kỹ: Trong thế giới tiền mã hóa, bảo mật là TRÁCH NHIỆM CÁ NHÂN. Chỉ bạn mới có thể bảo vệ tài sản của chính mình! Luôn cảnh giác - Khi nghi ngờ, ĐỪNG CLICK! #Security #phishingscam #BinanceAcademy #SAFU
🚨 CẢNH BÁO: ĐỪNG ĐỂ BỊ LỪA! Hiểu về Phishing trong 3 phút 🚨
Bạn có biết: Phishing là hình thức lừa đảo kỹ thuật số khi kẻ xấu giả mạo một tổ chức/tin nhắn đáng tin cậy để đánh cắp thông tin nhạy cảm của bạn.
🔍 Dấu hiệu nhận biết:
URL đáng ngờ, email lạ
Yêu cầu khẩn cấp/cấp bách
Lỗi chính tả, ngữ pháp
Đính kèm file hoặc link lạ
🎯 Các hình thức phishing phổ biến trong crypto:
Email giả mạo ví, sàn giao dịch
Tin nhắn Telegram/Discord giả hỗ trợ
Quảng cáo airdrop, giveaway giả
Ứng dụng ví giả mạo
🛡️ Cách phòng tránh:
KHÔNG bao giờ chia sẻ seed phrase/private key
Kiểm tra kỹ URL trước khi nhập thông tin
Bật xác thực 2 lớp (2FA)
Cập nhật phần mềm thường xuyên
💡 Nhớ kỹ:
Trong thế giới tiền mã hóa, bảo mật là TRÁCH NHIỆM CÁ NHÂN. Chỉ bạn mới có thể bảo vệ tài sản của chính mình!
Luôn cảnh giác - Khi nghi ngờ, ĐỪNG CLICK!
#Security #phishingscam #BinanceAcademy #SAFU
#PeckShieldAlert A #phishingscam address labeled "Fake_Phishing442897," which stole $55.4M in #DAI from a whale's account, has swapped 250K $DAI for 102.6 $ETH & transferred them to a new address 0x2751...fC12 The #phishing address currently holds ~$40.5m worth of cryptos, including ~15.18K $ETH, ~2.8M $DAI & ~327.3 $stETH
#PeckShieldAlert
A #phishingscam address labeled "Fake_Phishing442897," which stole $55.4M in #DAI from a whale's account, has swapped 250K $DAI for 102.6 $ETH & transferred them to a new address 0x2751...fC12
The #phishing address currently holds ~$40.5m worth of cryptos, including ~15.18K $ETH , ~2.8M $DAI & ~327.3 $stETH
#phishingscam Crypto investor loses $2.5M in stablecoins in double phishing scam A single victim has been scammed two times within three hours, losing a total of $2.5 million in stablecoins. According to data shared on May 26 by crypto compliance firm Cyvers, the victim sent 843,000 worth of USDt (USDT) followed by another 2.6 million USDt around three hours later. Cyvers said the scam used a method known as a zero-value transfer, a sophisticated form of onchain phishing.
#phishingscam
Crypto investor loses $2.5M in stablecoins in double phishing scam

A single victim has been scammed two times within three hours, losing a total of $2.5 million in stablecoins.

According to data shared on May 26 by crypto compliance firm Cyvers, the victim sent 843,000 worth of USDt (USDT) followed by another 2.6 million USDt around three hours later. Cyvers said the scam used a method known as a zero-value transfer, a sophisticated form of onchain phishing.
After laughing at fools that fell for phishing, got phished myself... Twas a good one,i give em that... 2 years, 1k to 46k down the drain, all the bags gone... back at square 1... here we go again ... #phishingscam
After laughing at fools that fell for phishing, got phished myself... Twas a good one,i give em that...

2 years, 1k to 46k down the drain, all the bags gone... back at square 1... here we go again ...

#phishingscam
☄️ Crypto Phishing Attacks Surge 215% in August: $55M Lost in Single Incident 📣 Cryptocurrency phishing attacks skyrocketed by 215% in August, with total losses exceeding $66 million. A single major attack accounted for $55 million, highlighting the increasing sophistication of scammers. While the number of victims decreased by 34% from July, the stolen amount surged dramatically. 🖥 The crypto industry is responding with measures like Binance's "antidote" against address poisoning scams and the launch of the Security Alliance anti-hack response team. These attacks underscore the critical need for heightened security awareness in the crypto space. ❗️ The surge in phishing attacks calls for extra caution. Always double-check addresses and be wary of suspicious links. Your crypto's safety depends on your awareness! So becareful !!! #scam #phishingscam #becareful #lost #TON
☄️ Crypto Phishing Attacks Surge 215% in August: $55M Lost in Single Incident

📣 Cryptocurrency phishing attacks skyrocketed by 215% in August, with total losses exceeding $66 million. A single major attack accounted for $55 million, highlighting the increasing sophistication of scammers. While the number of victims decreased by 34% from July, the stolen amount surged dramatically.

🖥 The crypto industry is responding with measures like Binance's "antidote" against address poisoning scams and the launch of the Security Alliance anti-hack response team. These attacks underscore the critical need for heightened security awareness in the crypto space.

❗️ The surge in phishing attacks calls for extra caution. Always double-check addresses and be wary of suspicious links. Your crypto's safety depends on your awareness!

So becareful !!!

#scam #phishingscam #becareful #lost #TON
--
Hausse
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds. Security isn’t just about smart contracts. It’s about not clicking like it’s 2010. #ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds.

Security isn’t just about smart contracts. It’s about not clicking like it’s 2010.
#ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
🚨 NUEVO: El CSO de Kraken, Nick Percoco, advierte sobre seguridad descuidada en eventos de criptomonedas: teléfonos desbloqueados, códigos QR sospechosos y Wi-Fi riesgoso. Utilice billeteras quemadoras y manténgase alerta. #ciberseguridad #exchange #phishingscam #estafas #Scam? $USDC
🚨 NUEVO: El CSO de Kraken, Nick Percoco, advierte sobre seguridad descuidada en eventos de criptomonedas: teléfonos desbloqueados, códigos QR sospechosos y Wi-Fi riesgoso.

Utilice billeteras quemadoras y manténgase alerta.

#ciberseguridad #exchange #phishingscam #estafas #Scam? $USDC
Dentro de las estafas más ingeniosas en 2025 (y cómo no caer en ellas)El mercado cripto ha madurado: atrajo instituciones, ganó regulación en distintas regiones del mundo y se profesionalizó. Pero en 2025, los estafadores también evolucionaron. Y ya no son solo los principiantes los que caen: incluso usuarios con experiencia están siendo engañados por fraudes cada vez más sofisticados. En este artículo, te mostramos las trampas más comunes del momento, cómo funcionan y qué puedes hacer para mantenerte seguro —especialmente si operas desde el celular o eres activo en redes sociales. 1. Phishing con deepfakes: la nueva cara del engaño Antes, el phishing se limitaba a sitios web clonados y correos falsos. En 2025, el fraude se volvió mucho más realista. Están circulando videos y audios generados con inteligencia artificial (deepfakes), en los que supuestas celebridades, CEOs o influencers recomiendan oportunidades de inversión. Estos contenidos se difunden principalmente en redes como X (antes Twitter), Instagram o TikTok, acompañados de links maliciosos. Al conectar tu wallet o ingresar datos, el resultado es la pérdida total de los fondos. Consejo clave: no confíes solo en una cara o una voz. Verifica siempre los canales oficiales y evita hacer clic en enlaces compartidos por terceros, aunque parezcan legítimos. 2. Apps falsas de staking y wallets clonadas Uno de los fraudes más frecuentes en 2025 involucra apps falsas que prometen “altos rendimientos” con [staking](https://www.binance.com/es-LA/square/post/13583675524105) o wallets que ofrecen “soporte a nuevas redes”. Estas apps suelen instalarse fuera de las tiendas oficiales, y al hacerlo, el usuario otorga permisos que permiten a los atacantes acceder a su frase semilla, monitorear su actividad o vaciar la wallet sin que se dé cuenta. Consejo clave: instala solo aplicaciones verificadas desde Google Play o App Store. Activa la autenticación en dos pasos (2FA) y nunca guardes claves privadas en dispositivos conectados. 3. Rug pulls “verdes”: el fraude con cara de ecología Los proyectos DeFi que se presentan como sostenibles o con impacto social han ganado fuerza en 2025. Muchos prometen retornos ligados a la tokenización de créditos de carbono o donaciones a causas ambientales. Pero en muchos casos, estos proyectos no tienen respaldo real, ni equipo detrás, ni actividad concreta. Recaudan fondos y luego desaparecen —el famoso [rug pull](https://www.binance.com/es-LA/square/post/16134036730890). Consejo clave: desconfía de cualquier promesa que combine rendimientos atractivos con “impacto positivo garantizado”. Investiga el whitepaper, verifica si la empresa fue auditada y revisa quién está detrás del proyecto. 4. Influencers y “bots expertos” en redes sociales Plataformas como Telegram y X están plagadas de perfiles que se hacen pasar por expertos en cripto. Publican gráficos, predicciones y “consejos calientes”, muchos generados por [IA](https://www.binance.com/es-LA/square/post/24602128738585), cuyo objetivo es re-dirigirte a sitios fraudulentos o grupos pagos. Además, hay bots que se hacen pasar por atención al cliente. Aparecen justo cuando publicas una queja o comentario sobre problemas con una wallet. Estos bots intentan que compartas tu seed phrase o accedas a enlaces sospechosos. Consejo clave: nunca compartas tu seed phrase, claves privadas ni capturas de pantalla con saldos. No permitas que nadie acceda remotamente a tu dispositivo. El soporte oficial jamás te contactará por fuera de los canales verificados. Consejos extra para cuidar tus activos en 2025 Revisa los permisos con herramientas como Wallet Guard y revoke.cash Cuando interactúas con dApps en Web3, tu wallet puede quedar con permisos activos incluso después de terminar el uso. Herramientas como Wallet Guard detectan comportamientos sospechosos y revoke.cash permite cancelar accesos innecesarios. Usarlas reduce el riesgo de ataques o drenaje de fondos. Nunca guardes tu frase semilla en la nube o archivos digitales Tu seed phrase es la llave maestra de tu cartera. Guardarla en Google Drive, emails, notas o fotos del celular es altamente riesgoso. Hackers y malwares acceden fácilmente a esos espacios. Lo ideal: anótala en papel y guárdala en un lugar físico y seguro. Aléjate de promesas de lucro rápido o mensajes con urgencia Frases como “última oportunidad”, “retorno garantizado” o “envía ahora y recibe el doble” son típicas de estafas. Si un mensaje te apura o parece demasiado bueno para ser verdad, probablemente no lo sea. Verifica la fuente con calma. Si dudas, no hagas clic ni interactúes. Mantén tus dispositivos protegidos y actualizados Tener el celular o computadora desactualizados facilita la entrada de malware. Instala siempre las versiones más recientes del sistema operativo, navegador y apps. Usa antivirus confiable y evita instalar aplicaciones de origen desconocido. Siempre que sea posible, activa 2FA. La nueva generación de estafas exige atención constante El ecosistema cripto se hace más sofisticado cada año —y los criminales también. En 2025, los fraudes son más creíbles, más personalizados y más difíciles de detectar. Pero con buena información, hábitos seguros y algo de desconfianza, es totalmente posible mantenerse protegido. Adopta una postura crítica, desconfía de atajos y, sobre todo, mantén el control de tus fondos. En un mercado donde la libertad es total, la responsabilidad también lo es. Invierte con conciencia y no caigas en las trampas digitales de 2025. #SeguridadDigital #Seguridad #phishingscam #estafas --- Imagen disponible en Freepik

Dentro de las estafas más ingeniosas en 2025 (y cómo no caer en ellas)

El mercado cripto ha madurado: atrajo instituciones, ganó regulación en distintas regiones del mundo y se profesionalizó. Pero en 2025, los estafadores también evolucionaron. Y ya no son solo los principiantes los que caen: incluso usuarios con experiencia están siendo engañados por fraudes cada vez más sofisticados.
En este artículo, te mostramos las trampas más comunes del momento, cómo funcionan y qué puedes hacer para mantenerte seguro —especialmente si operas desde el celular o eres activo en redes sociales.
1. Phishing con deepfakes: la nueva cara del engaño
Antes, el phishing se limitaba a sitios web clonados y correos falsos. En 2025, el fraude se volvió mucho más realista. Están circulando videos y audios generados con inteligencia artificial (deepfakes), en los que supuestas celebridades, CEOs o influencers recomiendan oportunidades de inversión.
Estos contenidos se difunden principalmente en redes como X (antes Twitter), Instagram o TikTok, acompañados de links maliciosos. Al conectar tu wallet o ingresar datos, el resultado es la pérdida total de los fondos.
Consejo clave: no confíes solo en una cara o una voz. Verifica siempre los canales oficiales y evita hacer clic en enlaces compartidos por terceros, aunque parezcan legítimos.
2. Apps falsas de staking y wallets clonadas
Uno de los fraudes más frecuentes en 2025 involucra apps falsas que prometen “altos rendimientos” con staking o wallets que ofrecen “soporte a nuevas redes”.
Estas apps suelen instalarse fuera de las tiendas oficiales, y al hacerlo, el usuario otorga permisos que permiten a los atacantes acceder a su frase semilla, monitorear su actividad o vaciar la wallet sin que se dé cuenta.
Consejo clave: instala solo aplicaciones verificadas desde Google Play o App Store. Activa la autenticación en dos pasos (2FA) y nunca guardes claves privadas en dispositivos conectados.
3. Rug pulls “verdes”: el fraude con cara de ecología
Los proyectos DeFi que se presentan como sostenibles o con impacto social han ganado fuerza en 2025. Muchos prometen retornos ligados a la tokenización de créditos de carbono o donaciones a causas ambientales.
Pero en muchos casos, estos proyectos no tienen respaldo real, ni equipo detrás, ni actividad concreta. Recaudan fondos y luego desaparecen —el famoso rug pull.
Consejo clave: desconfía de cualquier promesa que combine rendimientos atractivos con “impacto positivo garantizado”. Investiga el whitepaper, verifica si la empresa fue auditada y revisa quién está detrás del proyecto.
4. Influencers y “bots expertos” en redes sociales
Plataformas como Telegram y X están plagadas de perfiles que se hacen pasar por expertos en cripto. Publican gráficos, predicciones y “consejos calientes”, muchos generados por IA, cuyo objetivo es re-dirigirte a sitios fraudulentos o grupos pagos.
Además, hay bots que se hacen pasar por atención al cliente. Aparecen justo cuando publicas una queja o comentario sobre problemas con una wallet. Estos bots intentan que compartas tu seed phrase o accedas a enlaces sospechosos.
Consejo clave: nunca compartas tu seed phrase, claves privadas ni capturas de pantalla con saldos. No permitas que nadie acceda remotamente a tu dispositivo. El soporte oficial jamás te contactará por fuera de los canales verificados.
Consejos extra para cuidar tus activos en 2025
Revisa los permisos con herramientas como Wallet Guard y revoke.cash
Cuando interactúas con dApps en Web3, tu wallet puede quedar con permisos activos incluso después de terminar el uso. Herramientas como Wallet Guard detectan comportamientos sospechosos y revoke.cash permite cancelar accesos innecesarios. Usarlas reduce el riesgo de ataques o drenaje de fondos.
Nunca guardes tu frase semilla en la nube o archivos digitales
Tu seed phrase es la llave maestra de tu cartera. Guardarla en Google Drive, emails, notas o fotos del celular es altamente riesgoso. Hackers y malwares acceden fácilmente a esos espacios. Lo ideal: anótala en papel y guárdala en un lugar físico y seguro.
Aléjate de promesas de lucro rápido o mensajes con urgencia
Frases como “última oportunidad”, “retorno garantizado” o “envía ahora y recibe el doble” son típicas de estafas. Si un mensaje te apura o parece demasiado bueno para ser verdad, probablemente no lo sea. Verifica la fuente con calma. Si dudas, no hagas clic ni interactúes.
Mantén tus dispositivos protegidos y actualizados
Tener el celular o computadora desactualizados facilita la entrada de malware. Instala siempre las versiones más recientes del sistema operativo, navegador y apps. Usa antivirus confiable y evita instalar aplicaciones de origen desconocido. Siempre que sea posible, activa 2FA.
La nueva generación de estafas exige atención constante
El ecosistema cripto se hace más sofisticado cada año —y los criminales también. En 2025, los fraudes son más creíbles, más personalizados y más difíciles de detectar. Pero con buena información, hábitos seguros y algo de desconfianza, es totalmente posible mantenerse protegido.
Adopta una postura crítica, desconfía de atajos y, sobre todo, mantén el control de tus fondos. En un mercado donde la libertad es total, la responsabilidad también lo es.
Invierte con conciencia y no caigas en las trampas digitales de 2025.
#SeguridadDigital #Seguridad #phishingscam #estafas

---
Imagen disponible en Freepik
A Man Lost $1.5 Million Instantly — But the Market Had Nothing to Do With ItLosing money in trading is common, but imagine watching $1.5 million vanish in seconds — not because of a bad trade, but due to one critical mistake. That’s exactly what happened to a crypto investor who fell victim to a sophisticated phishing scam. Instead of the market turning against him, it was a fake link that cost him everything. What Went Wrong? The investor connected his wallet to what appeared to be a legitimate decentralized app (dApp). But hidden beneath the surface was malicious code designed to drain the wallet instantly once permissions were granted. Once connected, the scam smart contract took full control — transferring the entire $1.5 million balance to the attacker’s wallet within seconds. The Real Lesson This wasn’t a trading loss — it was a security lapse. The market remained stable, but a lack of caution with wallet permissions and unknown links led to disaster. How to Protect Yourself Always double-check URLs before connecting your wallet. Use hardware wallets for large holdings. Revoke unnecessary token approvals regularly. Stay updated on the latest phishing tactics in crypto. Final Thoughts In crypto, it’s not just the markets you need to watch — it’s your own security habits. One careless click can cost more than any market crash. #PhishingScam #DeFiRisks

A Man Lost $1.5 Million Instantly — But the Market Had Nothing to Do With It

Losing money in trading is common, but imagine watching $1.5 million vanish in seconds — not because of a bad trade, but due to one critical mistake.

That’s exactly what happened to a crypto investor who fell victim to a sophisticated phishing scam. Instead of the market turning against him, it was a fake link that cost him everything.

What Went Wrong?

The investor connected his wallet to what appeared to be a legitimate decentralized app (dApp). But hidden beneath the surface was malicious code designed to drain the wallet instantly once permissions were granted.

Once connected, the scam smart contract took full control — transferring the entire $1.5 million balance to the attacker’s wallet within seconds.

The Real Lesson

This wasn’t a trading loss — it was a security lapse. The market remained stable, but a lack of caution with wallet permissions and unknown links led to disaster.

How to Protect Yourself

Always double-check URLs before connecting your wallet.

Use hardware wallets for large holdings.

Revoke unnecessary token approvals regularly.

Stay updated on the latest phishing tactics in crypto.

Final Thoughts

In crypto, it’s not just the markets you need to watch — it’s your own security habits. One careless click can cost more than any market crash.

#PhishingScam #DeFiRisks
Capitán inversor
--
Recibí este mensaje en una red social. ¿ustedes qué harían?

No caigan en estafas.

Mejor inviertan en #bnb

#phishing
#estafa
#FOMCMeeting
🚨 SCAM ALERT: “Crypto Legacy” DM on Twitter! 🚨 Getting DMs like this? 👇 💔 "I have cancer... you're the lucky one... take my $6M USDT..." 🔗 Fake link 🔐 Username & password 💸 Balance: 6,781,231.9891 USDT 😳 🧠 How the Scam Works: 1. Emotional Manipulation The message uses an emotional story (cancer, death, legacy) to lower your guard and make you feel "special" or "chosen." 2. Fake Login Details It includes a fake username, password, and a large, tempting fake crypto balance (e.g., 6781231.9891 USDT). 3. Malicious Link The link (e.g., j.nwebi.com) is designed to: Steal your personal data or credentials. Infect your device with malware. Trick you into logging in so scammers can get your real info or crypto wallet access. ❗ It’s 100% a Phishing Scam! They want you to click, log in, and BAM—your data or wallet is GONE. ✅ DO NOT: • Click the link • Enter any info • Trust random emotional stories 🛡️ DO THIS INSTEAD: • Report ❗ • Block 🚫 • Warn your friends 🧠 Stay sharp. The only thing these scammers are “leaving behind” is regret. #Twitter #cryptoscam #phishingscam #ScamAlert
🚨 SCAM ALERT: “Crypto Legacy” DM on Twitter! 🚨

Getting DMs like this? 👇
💔 "I have cancer... you're the lucky one... take my $6M USDT..."
🔗 Fake link
🔐 Username & password
💸 Balance: 6,781,231.9891 USDT 😳

🧠 How the Scam Works:

1. Emotional Manipulation
The message uses an emotional story (cancer, death, legacy) to lower your guard and make you feel "special" or "chosen."

2. Fake Login Details
It includes a fake username, password, and a large, tempting fake crypto balance (e.g., 6781231.9891 USDT).

3. Malicious Link
The link (e.g., j.nwebi.com) is designed to:

Steal your personal data or credentials.

Infect your device with malware.

Trick you into logging in so scammers can get your real info or crypto wallet access.

❗ It’s 100% a Phishing Scam!
They want you to click, log in, and BAM—your data or wallet is GONE.

✅ DO NOT:
• Click the link
• Enter any info
• Trust random emotional stories

🛡️ DO THIS INSTEAD:
• Report ❗
• Block 🚫
• Warn your friends 🧠

Stay sharp. The only thing these scammers are “leaving behind” is regret.

#Twitter #cryptoscam #phishingscam #ScamAlert
Iris_Reed
--
🚨 PROTECT YOUR BINANCE ACCOUNT NOW! 🔐
Phishing scams are getting smarter — don’t be their next target.

Here’s how to outsmart them in seconds 👇



🔒 Set Your Anti-Phishing Code (Lifesaver Tip):
It’s a unique code you choose — and Binance includes it in every legit email they send you.

📌 Example:
You set your code to “BOB123”
✅ If it’s a REAL Binance email — you’ll see BOB123
❌ If it’s a SCAM — the code will be missing or wrong



🛠️ How To Set It Up (Takes 30 seconds):
1️⃣ Open Binance App
2️⃣ Go to Security Settings → Anti-Phishing Code
3️⃣ Create your personal code (keep it private!)
4️⃣ Done ✅



⚠️ Important Reminders:
🚫 NEVER trust emails, links, or SMS without your code
📱 ALWAYS use the official Binance app/website
🧠 Trust your CODE — not your eyes



🛡️ Stay smart. Stay secure.
A 10-second setup today could save your entire portfolio tomorrow.

#MyTradingStyle #BinanceAlphaAlert #FOMCMeeting #DAOBaseAIBinanceTGE
🚨 Breaking News Alert 🚨 ⚠️ Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! 🤑💰 According to PANews, the notorious ‘Fake Ledger’ scam is BACK! Hackers are 📦 mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a 🕵️‍♂️ malicious app — leading to 💸 asset theft! This attack, first spotted in 2021, now includes: 🔁 Preset recovery phrases 🎲 Tampered RNG chips 🧠 Expert Warning: These physical phishing attacks may seem rare but have a 🚀 high success rate, especially among 💼 high-net-worth users. How to Stay Safe: ✅ Never enter your seed phrase into ANY app or website ✅ Buy ONLY from official sources ❌ Don’t trust unsolicited packages — even if it looks “official” 🔐 Protect your crypto. Stay sharp. Stay safe! #CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist $BTC {spot}(BTCUSDT) $ETH {spot}(ETHUSDT) $XRP {spot}(XRPUSDT)
🚨 Breaking News Alert 🚨

⚠️ Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! 🤑💰

According to PANews, the notorious ‘Fake Ledger’ scam is BACK!
Hackers are 📦 mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a 🕵️‍♂️ malicious app — leading to 💸 asset theft!

This attack, first spotted in 2021, now includes:
🔁 Preset recovery phrases
🎲 Tampered RNG chips

🧠 Expert Warning: These physical phishing attacks may seem rare but have a 🚀 high success rate, especially among 💼 high-net-worth users.

How to Stay Safe:
✅ Never enter your seed phrase into ANY app or website
✅ Buy ONLY from official sources
❌ Don’t trust unsolicited packages — even if it looks “official”

🔐 Protect your crypto. Stay sharp. Stay safe!

#CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist
$BTC
$ETH
$XRP
🚨 Cybersecurity Warning: Surge in Fake DeepSeek Phishing Websites!$ETH A growing number of fraudulent DeepSeek phishing sites have emerged, now surpassing 2,650. Reports indicate a significant spike in these scams since January 26, posing a serious threat to users. These deceptive platforms are designed to steal login credentials and trick unsuspecting individuals into purchasing virtual assets through counterfeit domains and interfaces.$XRP How These Scams Operate Cybercriminals craft lookalike websites that mimic the official DeepSeek platform, luring users into entering sensitive information. Once credentials are compromised, scammers gain unauthorized access to accounts, leading to potential financial losses. In other cases, users are tricked into making payments for assets that do not exist.$BTC How to Stay Safe 🔹 Always verify website URLs before entering any login details. 🔹 Avoid clicking on suspicious links shared via emails, social media, or unverified sources. 🔹 Enable two-factor authentication (2FA) for an added layer of security. 🔹 Report fraudulent sites to help protect the community. Stay alert and safeguard your assets! 🛑 #OnlineSecurity #PhishingScam #CryptoFraud #AICrashOrComeback #TariffHODL
🚨 Cybersecurity Warning: Surge in Fake DeepSeek Phishing Websites!$ETH

A growing number of fraudulent DeepSeek phishing sites have emerged, now surpassing 2,650. Reports indicate a significant spike in these scams since January 26, posing a serious threat to users. These deceptive platforms are designed to steal login credentials and trick unsuspecting individuals into purchasing virtual assets through counterfeit domains and interfaces.$XRP

How These Scams Operate

Cybercriminals craft lookalike websites that mimic the official DeepSeek platform, luring users into entering sensitive information. Once credentials are compromised, scammers gain unauthorized access to accounts, leading to potential financial losses. In other cases, users are tricked into making payments for assets that do not exist.$BTC

How to Stay Safe

🔹 Always verify website URLs before entering any login details.
🔹 Avoid clicking on suspicious links shared via emails, social media, or unverified sources.
🔹 Enable two-factor authentication (2FA) for an added layer of security.
🔹 Report fraudulent sites to help protect the community.

Stay alert and safeguard your assets! 🛑 #OnlineSecurity #PhishingScam #CryptoFraud #AICrashOrComeback #TariffHODL
April 2025 Crypto Phishing Scams Surge: $5.29M Lost Across 7,565 VictimsIn April 2025, ScamSniffer reported that phishing scams led to losses totaling $5.29 million, impacting 7,565 victims. While this represents a 17% decrease in total losses compared to March, the number of victims increased by 26%, indicating a rise in the frequency of attacks. 🔍 Key Attack Vectors: Address Poisoning: The most significant single attack involved address poisoning, resulting in a loss of $1.43 million. This technique involves scammers sending small transactions from addresses that closely resemble those of legitimate contacts, hoping users will inadvertently send funds to the fraudulent address. Permit Exploits: Scammers exploited unrevoked permissions, leading to substantial unauthorized withdrawals. 🛡️ Preventive Measures: 1. Double-Check Addresses: Always verify the recipient's address before initiating a transaction. Be cautious of addresses that appear familiar but may have subtle differences. 2. Revoke Unused Permissions: Regularly review and revoke unnecessary permissions granted to decentralized applications (dApps) to minimize potential vulnerabilities. 3. Use Reputable Security Tools: Employ browser extensions and security tools that can detect and warn against known phishing sites and malicious contracts. 4. Stay Informed: Keep abreast of the latest phishing tactics and scams by following trusted sources and communities within the crypto space. By staying vigilant and adopting these practices, crypto users can better protect their assets against evolving phishing threats. 🔒 Recommended Security Tools: Hardware Wallets: Utilizing hardware wallets can provide an added layer of security by keeping your private keys offline. Security Software: Consider using comprehensive security software solutions that offer real-time protection against malware and phishing attempts. Staying informed and implementing robust security measures are crucial steps in safeguarding your cryptocurrency assets against phishing scams. #phishingscam #CryptoScamAlert #scam $STO {spot}(STOUSDT)

April 2025 Crypto Phishing Scams Surge: $5.29M Lost Across 7,565 Victims

In April 2025, ScamSniffer reported that phishing scams led to losses totaling $5.29 million, impacting 7,565 victims. While this represents a 17% decrease in total losses compared to March, the number of victims increased by 26%, indicating a rise in the frequency of attacks.
🔍 Key Attack Vectors:
Address Poisoning: The most significant single attack involved address poisoning, resulting in a loss of $1.43 million. This technique involves scammers sending small transactions from addresses that closely resemble those of legitimate contacts, hoping users will inadvertently send funds to the fraudulent address. Permit Exploits: Scammers exploited unrevoked permissions, leading to substantial unauthorized withdrawals.
🛡️ Preventive Measures:
1. Double-Check Addresses: Always verify the recipient's address before initiating a transaction. Be cautious of addresses that appear familiar but may have subtle differences.
2. Revoke Unused Permissions: Regularly review and revoke unnecessary permissions granted to decentralized applications (dApps) to minimize potential vulnerabilities.
3. Use Reputable Security Tools: Employ browser extensions and security tools that can detect and warn against known phishing sites and malicious contracts.
4. Stay Informed: Keep abreast of the latest phishing tactics and scams by following trusted sources and communities within the crypto space.
By staying vigilant and adopting these practices, crypto users can better protect their assets against evolving phishing threats.
🔒 Recommended Security Tools:
Hardware Wallets: Utilizing hardware wallets can provide an added layer of security by keeping your private keys offline. Security Software: Consider using comprehensive security software solutions that offer real-time protection against malware and phishing attempts.
Staying informed and implementing robust security measures are crucial steps in safeguarding your cryptocurrency assets against phishing scams.
#phishingscam #CryptoScamAlert #scam
$STO
The $2 Million Phishing Scam: A Cautionary TaleA cryptocurrency investor fell prey to a sophisticated phishing scheme, losing $2 million worth of Ethereum (501 ETH). The attacker exploited the "IncreaseAllowance" function, gaining unauthorized access to the victim's funds. The Incident: The investor received a seemingly legitimate email or message that tricked them into authorizing the malicious transaction. The attacker swiftly drained the funds, leaving the victim with significant financial losses. Key Takeaways: - Phishing schemes can be highly sophisticated - Verify authenticity before taking action - Robust security measures are crucial to protect digital assets Stay Safe: - Be cautious of suspicious emails or messages - Verify legitimacy before interacting with transactions - Implement strong security protocols #phishingscam #Ethereum #Cryptocurrency #Security #Cybercrime $ETH {spot}(ETHUSDT)

The $2 Million Phishing Scam: A Cautionary Tale

A cryptocurrency investor fell prey to a sophisticated phishing scheme, losing $2 million worth of Ethereum (501 ETH). The attacker exploited the "IncreaseAllowance" function, gaining unauthorized access to the victim's funds.
The Incident:
The investor received a seemingly legitimate email or message that tricked them into authorizing the malicious transaction. The attacker swiftly drained the funds, leaving the victim with significant financial losses.
Key Takeaways:
- Phishing schemes can be highly sophisticated
- Verify authenticity before taking action
- Robust security measures are crucial to protect digital assets
Stay Safe:
- Be cautious of suspicious emails or messages
- Verify legitimacy before interacting with transactions
- Implement strong security protocols
#phishingscam #Ethereum #Cryptocurrency #Security #Cybercrime $ETH
🚨 BEWARE! NEW BINANCE PHISHING SCAM IS HERE! 🚨 📢 Crypto users, be alert! A new scam is making rounds where fraudsters impersonate Binance officials, sending fake messages that appear in real chat threads! 😱 🔍 How This Scam Works: ⚠️ Fake Binance Messages – Scammers send messages that blend into existing Binance chat threads. ⚠️ Urgent Alerts – They claim your account is at risk and needs immediate action. ⚠️ Phishing Links – You’ll be directed to fake websites or asked to transfer funds to a "trust wallet." 🛡️ How to Protect Yourself: ✅ Always verify messages from Binance through the official app or website. ✅ NEVER click on suspicious links. ✅ Turn on 2FA for extra security. ✅ Stay updated with Binance’s official security alerts. 🚀 What to Do If You Get a Scam Message? 🔹 Report it to Binance & your local authorities. 🔹 Never share your login details or private keys. 🔹 Keep an eye on your account for unusual activity. 🚫 DON’T FALL FOR IT! Protect your crypto like a pro. 💪 💬 Have you ever encountered a crypto scam? Share your experience in the comments! 👇 #crypto #Cryptoscam #Staysave #phishingscam #CryptoSecurity
🚨 BEWARE! NEW BINANCE PHISHING SCAM IS HERE! 🚨

📢 Crypto users, be alert! A new scam is making rounds where fraudsters impersonate Binance officials, sending fake messages that appear in real chat threads! 😱

🔍 How This Scam Works:
⚠️ Fake Binance Messages – Scammers send messages that blend into existing Binance chat threads.
⚠️ Urgent Alerts – They claim your account is at risk and needs immediate action.
⚠️ Phishing Links – You’ll be directed to fake websites or asked to transfer funds to a "trust wallet."

🛡️ How to Protect Yourself:
✅ Always verify messages from Binance through the official app or website.
✅ NEVER click on suspicious links.
✅ Turn on 2FA for extra security.
✅ Stay updated with Binance’s official security alerts.

🚀 What to Do If You Get a Scam Message?
🔹 Report it to Binance & your local authorities.
🔹 Never share your login details or private keys.
🔹 Keep an eye on your account for unusual activity.

🚫 DON’T FALL FOR IT! Protect your crypto like a pro. 💪

💬 Have you ever encountered a crypto scam? Share your experience in the comments! 👇

#crypto #Cryptoscam #Staysave #phishingscam #CryptoSecurity
😈Breaking: Phishing Attack Alert!,👹 Loopscale has issued a warning about phishing attacks targeting its users, as reported by PANews. Here's what you need to know: - *Phishing Attempts*: Loopscale's team has received reports of phishing attempts and wants users to be cautious. - *Safety Measures*: Loopscale assures users that its team will never send direct messages or emails. Be wary of links claiming to be from Loopscale. - *Official Updates*: Loopscale will only communicate official updates, such as withdrawal processes, through their official account. To protect yourself: - *Avoid Suspicious Links*: Don't click on links from unverified sources claiming to be Loopscale. - *Verify Information*: Always check Loopscale's official account for updates. - *Be Cautious with Messages*: Be wary of direct messages or emails claiming to be from Loopscale. Stay vigilant and report any suspicious activity to Loopscale's official support channels. #Loopscale #BinanceAlphaAlert #phishingscam #ProtectYourAssets #warning! $BTC $ETH $BNB {spot}(BNBUSDT)
😈Breaking: Phishing Attack Alert!,👹

Loopscale has issued a warning about phishing attacks targeting its users, as reported by PANews. Here's what you need to know:
- *Phishing Attempts*: Loopscale's team has received reports of phishing attempts and wants users to be cautious.
- *Safety Measures*: Loopscale assures users that its team will never send direct messages or emails. Be wary of links claiming to be from Loopscale.
- *Official Updates*: Loopscale will only communicate official updates, such as withdrawal processes, through their official account.

To protect yourself:
- *Avoid Suspicious Links*: Don't click on links from unverified sources claiming to be Loopscale.
- *Verify Information*: Always check Loopscale's official account for updates.
- *Be Cautious with Messages*: Be wary of direct messages or emails claiming to be from Loopscale.

Stay vigilant and report any suspicious activity to Loopscale's official support channels.
#Loopscale #BinanceAlphaAlert #phishingscam #ProtectYourAssets #warning! $BTC $ETH $BNB
North Korean Kimsuky Exposed by Massive Data LeakIn June 2025, the cybersecurity community was shaken. A member of the notorious North Korean hacking group Kimsuky APT became the victim of a massive data breach, revealing hundreds of gigabytes of sensitive internal files, tools, and operational details. According to security experts from Slow Mist, the leaked data included browser histories, detailed phishing campaign logs, manuals for custom backdoors and attack systems such as the TomCat kernel backdoor, modified Cobalt Strike beacons, the Ivanti RootRot exploit, and Android malware like Toybox. Two Compromised Systems and Hacker “KIM” The breach was linked to two compromised systems operated by an individual known as “KIM” – one was a Linux developer workstation (Deepin 20.9), the other a publicly accessible VPS server. The Linux system was likely used for malware development, while the VPS hosted phishing materials, fake login portals, and command-and-control (C2) infrastructure. The leak was carried out by hackers identifying themselves as “Saber” and “cyb0rg”, who claimed to have stolen and published the contents of both systems. While some evidence ties “KIM” to known Kimsuky infrastructure, linguistic and technical indicators also suggest a possible Chinese connection, leaving the true origin uncertain. A Long History of Cyber Espionage Kimsuky has been active since at least 2012 and is linked to the Reconnaissance General Bureau, North Korea’s primary intelligence agency. It has long specialized in cyber espionage targeting governments, think tanks, defense contractors, and academia. In 2025, its campaigns – such as DEEP#DRIVE – relied on multi-stage attack chains. They typically began with ZIP archives containing LNK shortcut files disguised as documents, which, when opened, executed PowerShell commands to download malicious payloads from cloud services like Dropbox, using decoy documents to appear legitimate. Advanced Techniques and Tools In spring 2025, Kimsuky deployed a mix of VBScript and PowerShell hidden inside ZIP archives to: Log keystrokesSteal clipboard dataHarvest cryptocurrency wallet keys from browsers (Chrome, Edge, Firefox, Naver Whale) Attackers also paired malicious LNK files with VBScripts that executed mshta.exe to load DLL-based malware directly into memory. They used custom RDP Wrapper modules and proxy malware to enable covert remote access. Programs like forceCopy extracted credentials from browser configuration files without triggering standard password access alerts. Exploiting Trusted Platforms Kimsuky abused popular cloud and code-hosting platforms. In a June 2025 spear phishing campaign targeting South Korea, private GitHub repositories were used to store malware and stolen data. By delivering malware and exfiltrating files via Dropbox and GitHub, the group was able to hide its activity within legitimate network traffic. #NorthKoreaHackers , #cyberattacks , #CyberSecurity , #phishingscam , #worldnews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Kimsuky Exposed by Massive Data Leak

In June 2025, the cybersecurity community was shaken. A member of the notorious North Korean hacking group Kimsuky APT became the victim of a massive data breach, revealing hundreds of gigabytes of sensitive internal files, tools, and operational details.
According to security experts from Slow Mist, the leaked data included browser histories, detailed phishing campaign logs, manuals for custom backdoors and attack systems such as the TomCat kernel backdoor, modified Cobalt Strike beacons, the Ivanti RootRot exploit, and Android malware like Toybox.

Two Compromised Systems and Hacker “KIM”
The breach was linked to two compromised systems operated by an individual known as “KIM” – one was a Linux developer workstation (Deepin 20.9), the other a publicly accessible VPS server.

The Linux system was likely used for malware development, while the VPS hosted phishing materials, fake login portals, and command-and-control (C2) infrastructure.
The leak was carried out by hackers identifying themselves as “Saber” and “cyb0rg”, who claimed to have stolen and published the contents of both systems. While some evidence ties “KIM” to known Kimsuky infrastructure, linguistic and technical indicators also suggest a possible Chinese connection, leaving the true origin uncertain.

A Long History of Cyber Espionage
Kimsuky has been active since at least 2012 and is linked to the Reconnaissance General Bureau, North Korea’s primary intelligence agency. It has long specialized in cyber espionage targeting governments, think tanks, defense contractors, and academia.
In 2025, its campaigns – such as DEEP#DRIVE – relied on multi-stage attack chains. They typically began with ZIP archives containing LNK shortcut files disguised as documents, which, when opened, executed PowerShell commands to download malicious payloads from cloud services like Dropbox, using decoy documents to appear legitimate.

Advanced Techniques and Tools
In spring 2025, Kimsuky deployed a mix of VBScript and PowerShell hidden inside ZIP archives to:
Log keystrokesSteal clipboard dataHarvest cryptocurrency wallet keys from browsers (Chrome, Edge, Firefox, Naver Whale)
Attackers also paired malicious LNK files with VBScripts that executed mshta.exe to load DLL-based malware directly into memory. They used custom RDP Wrapper modules and proxy malware to enable covert remote access.
Programs like forceCopy extracted credentials from browser configuration files without triggering standard password access alerts.

Exploiting Trusted Platforms
Kimsuky abused popular cloud and code-hosting platforms. In a June 2025 spear phishing campaign targeting South Korea, private GitHub repositories were used to store malware and stolen data.

By delivering malware and exfiltrating files via Dropbox and GitHub, the group was able to hide its activity within legitimate network traffic.

#NorthKoreaHackers , #cyberattacks , #CyberSecurity , #phishingscam , #worldnews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨🔒Virtuals Protocol Discord Hacked & Fake Links Detected! ⚠️A Discord moderator’s private key was compromised, leading to fake website links being shared. 🔍Scam Sniffer found 3 malicious links on Google impersonating Virtuals Protocol. 🛡️Always verify official links before clicking! #CyberSecurity #CryptoSafety #Hacks #PhishingScam
🚨🔒Virtuals Protocol Discord Hacked & Fake Links Detected!

⚠️A Discord moderator’s private key was compromised, leading to fake website links being shared.
🔍Scam Sniffer found 3 malicious links on Google impersonating Virtuals Protocol.
🛡️Always verify official links before clicking!
#CyberSecurity #CryptoSafety #Hacks #PhishingScam
Logga in för att utforska mer innehåll
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer