Latest

Hackers shift focus from protocols to cryptocurrency end users – CSO Binance

  • The exchange has published a guide to “digital hygiene.”
  • A spokesman says hackers are increasingly targeting users rather than protocols
  • There is an entire ecosystem in the darknet
  • which buys and sells information that later serves as the basis for attacks

Binance published guidelines at the end of June on how to protect its funds from phishing attacks.. CSO Jimmy Suh believes that hackers have shifted their focus, targeting the “weakest link” in the form of ordinary users.

“Cybercriminals always choose the easiest way. It’s also a business for them. It’s a well-established ecosystem,” Su emphasized.

He said there is a full-fledged network of hackers on the darknet.. It falls into four categories: data collectors, data engineers, hackers, and those who launder stolen cryptocurrency.

The former search for user information, collate and organize data. According to Su, there is a full-fledged marketplace on the darknet where you can buy or sell tables with lots of contacts and personal details. Any data leakage is a rich field of opportunity for them. Often such precedents lead to a wave of phishing attacks.

Data-engineers verify and clarify information. They also use scripts and bots to find connections of the target group of victims with the cryptocurrency segment.

Hackers and other cybercriminals use this information to hack or extort funds. Their tools range from fake text messages supposedly from the administration to malicious software.

The last, but perhaps the most important link is those who launder stolen funds. They use a network of wallets, mixers, platforms in sub-sanctioned countries to “whitewash” and withdraw cryptocurrency.</nbsp;

So says he knows precedents when a group of hackers could hold stolen capital for 2-3 years to make sure there is no trace to that money.</nbsp;

It is a well-oiled mechanism, an entire ecosystem that cannot be completely eliminated.. That’s why it’s so important to watch out for personal “digital hygiene” by carefully monitoring the transmission of any information.