Proofpoint researchers have also observed multiple examples of phishing threat actors creating and deploy phishing kits to harvest both login credentials to cryptocurrency related sites and cryptocurrency wallet credentials or passphrases. — DARWIN LAGAZON/Pixabay
Studies by Proofpoint have found that both of these threat types contributed to around US$14bil in cryptocurrency losses in 2021. In fact, BEC topped the list of types of attacks CISOs in the UAE expect to face in the coming months, with 35% of CISOs being concerned about potential BEC attacks. There are multiple DeFi applications and platforms — such as cryptocurrency exchanges — that people can use to manage their cryptocurrency, she added."These platforms often require usernames and passwords, which are potential targets for financially motivated threat actors.
In 2022, Proofpoint has observed regular attempts to compromise user's cryptocurrency wallets using credential harvesting. This method often relies on the delivery of a URL within an email body or formatted object which redirects to a credential harvesting landing page. Notably these landing pages have begun to solicit values utilised in the transfer and conversion of cryptocurrencies.
Malaysia Latest News, Malaysia Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.