How hackers steal cryptocurrency ?

in #cryptocurrency6 years ago

shutterstock-1069415450.png

In secure digital currencies Print email
The issue of security for digital currency users and those interested in this area is very important because, given the features of digital currencies, the chances of hacking and stealing are very high.

If you have worked on one of the services associated with digital currencies such as wallets, you often know that it is often necessary to overwhelm the tedious and sometimes complex process of memorizing recovery phrases and codes or to save some code or information for later access. . It is true that some wallets give them full control of the private keys to the users, but the cost of having control is that they should be responsible for maintaining the security of your digital currency.

And since most people are not experts in security, they are not at the risk of not knowing that they are at risk, and even many times, technologists do not observe the most basic security issues, which is a surprise.

In the world of digital currencies, you are always at risk when you have a valid wallet that today is known as a high standard. Because many times, problems arise when you intend to connect with your wallet. So what puts us at risk is not necessarily the weakness of the equipment or services you are dealing with, but it's not paying attention.

In the remainder of this article, learn from Businz's 10 tricks and how hackers use their private keys to steal your digital currency.

1 - Copy / Paste
You enter your wallet and you plan to send some Bitcoin or Altoquin to another address. Therefore, copy the recipient's address and place it in Walt as the receiver. But you do not know that a simple and small software (like CryptoShuffler) has the address of the recipient with the address the hacker has given it.

In other words, when you copy the recipient's address, the malicious software imports the hacker's address into your device's cache, and you are also unaware of that, you will be logging that address as the recipient in your own wallet.

Obviously, by sending Bitcoin or any other currency to the wrong address, it will no longer be possible to return it.

Solution 1: Although difficult, but again, check the character again before entering the recipient's location. Or use a QR code scanner to scan addresses.

Workaround 2: Do not install any suspicious software, app or program you do not trust on the system. Regularly scan your system through updated anti-virus.

2 - Fake apps
Hackers can install apps as the official app of a famous service. Specifically, apps similar to different exchange apps can be made by hackers to steal your digital currency.
When you install this fake app and import your digital currency, you actually have your own two hackers.

The Android operating system is more vulnerable than IOS and should be fully aware of the source and credibility of the programs you install.

Solution 1: Simple, never let your mobile phone unlock fingerprint, pinch, or face detection. Make sure you enable two-step login for wallet and currency exchange apps.

Workaround 2: Install only apps that you trust to use the official and valid app for the service. From time to time, delete your old apps and files from your phone.

3 - Browser Extensions
Some extras in the Chrome browser or Firefox claim that they can provide you with a better user experience on the trading platforms . But it's likely that these browser plug-ins will store and access all information you register on the sites.

Workaround 1: Do not install any plugins on your browser. To access important sites, open the browser in "Private mode."
(To do this in the Firefox browser in the File menu New Private Window and in the Chrome browser, click New Incognito Window)

Workaround 2: Use a separate browser for sensitive tasks such as access to currency exchange and wallet. Brave Browser is one of the best options for this.

4 - Fake sites
You start typing the address of the site in your browser's address bar, but because your browser or system is hacked, the same site address will automatically be imported and you will be redirected to that similar, but fake site.
The fake site is exactly the same as the original site, with the difference that when you enter the information into it, the information is hacked and your account balance is stolen.

Solution: Be sure to check the presence of the green https at the beginning of the address + the valid address of the site.

5 - Google Fake Ads
fake-url

This is also a well-known technique used by hackers to steal information.
You are looking for a site on Google, but on a link created by the hackers and a Google ad and the link is created to resemble the site's original link.
With this trick, you enter a fake site with a completely similar appearance to your site and your information is stolen.

Solution: The only solution is to carefully check the link you click on in Google ads.

6 - Fraudulent accounts on social networks
Just follow the social networking pages that were announced and approved on its official site.

Do not trust any other source, even the recommendations given by the auto-Twitter or Facebook and Instagram algorithms are not trusted and may display fake pages.

The best solution is to find their pages on social networks only by clicking on the social network link provided on the relevant service site.

7 - Two-step mobile entry
This is a very well-known problem. Some services require you to give their mobile number to send a 2-step verification code, but some hackers with the skills they have in deceiving the mobile operator support team will get the verification code and access your account.

Solution: You can not even use two-way sign-ups from mobile and use apps like the Google Authenticator application. Or, if you use the mobile for a two-step login, you have the same number.

8 - Phishing emails
Sample Email Phishing
Sample Email Phishing

You will receive an email from a known service member that uses the same design, format, and text, and you will be prompted to click on a link. But in fact, this email is a fake email sent by a hacker who tries to fetch you a site by clicking on a link, or installing malware on your system.

Workaround 1: Never open emails that the sender does not recognize.

Action 2: Do not click blindly on any link. If you were unsure whether the email was sent from the official site, check the link carefully. Of course, the hacker may place a long address on the link to hide the link; in this case, you can use the services that review the link redirector (such as http://www.redirect-checker.org ) and see the link to Where is it going

9 - Hack Wi-Fi
You may have heard a lot of places that the security protocol designed for most of the Wi-Fi routers is in danger. With the so-called "krack attack" attack, anyone can get the data exchanged on the Wi-Fi network you're connected to.

So when you connect to a public Wi-Fi, such as an airport or coffee shop, there's a similar problem.

Solution 1: Make sure your router is not vulnerable, check for updates, and never log in to your wallet and accounts when connected to a public Wi-Fi.

10 - Free Tokens
The free distribution of token is a digital currency, called Airdrop, and because of the attractiveness of users, hackers use this trick to get individuals' information.

So do not pay attention to any message that is based on receiving tokens. If you are interested in receiving free tokens, only work with authoritative and careful resources.

If you also know more tricks of hackers that attention can be made to prevent digital currency being stolen, please write in the comments section.

Follow @googleguy for more amazing stuff

Sort:  

Hello @googleguy,
Your post "How hackers steal cryptocurrency ?" hast just been Resteemed !!! 😉😉😉
You have achived this service by following me.


🙃🙃🙃 Be ENGASED to continue with this FREE Restreem service @tow-heed🙃😝🙃