The FBI believes there may soon be attacks on crypto exchanges. For this, it has issued a direct warning to owners of cryptocurrencies, exchanges and digital payment platforms, warning that there is a risk of attacks that could lead to serious losses.
According to reports , hackers are using increasingly sophisticated attack systems.
For example, they pretend to be the technical assistance of an exchange, or take control of the accounts by forcing the authentication system, or even “take over” the SIMs of the victims they manage to command.
The types of attacks on exchanges and crypto users according to the FBI
The FBI believes the cryptocurrency world may soon be the victim of these attacks. The most common one usually starts with emails that have the appearance of being official communications from well-known platforms, but which are in reality nothing more than replies from malicious people.
In this type of scam, the user is usually diverted to a landing page where he is asked to enter his login credentials, and that is enough for the hackers to take over his account.
But other more sophisticated scams also set up fake technical assistance for the user who thinks he is talking to exponents of an exchange and instead is releasing sensitive data in this case too, which is stolen from him.
The most sophisticated attack is the so-called ” SIM Swapping” . In this case, the hackers divert the traffic of a phone to a SIM in their possession, which is done by forcing the providers of the service providers.
This ensures that the hackers receive the messages and calls of the victims that allow them to overcome the security systems, those that for example involve entering a code that arrives via SMS. This allows criminals to access the applications used by the victims undisturbed, cleaning current accounts and wallets.
In the case of cryptocurrencies, these episodes unfortunately become even more serious because it is difficult to recover cryptocurrencies that have been stolen.
The same advice always applies:
- equip themselves with adequate protection systems;
- pay attention to the senders of the emails, even when they seem authentic;
- do not download suspicious documents;
- in case of doubt about the identity of the sender of an e-mail, contact him directly to make sure that he is the one who sent the e-mail;
- Pay attention to emails that ask you to enter your data.