At the beginning of the goals crypto currency Investors are coming. It has become one of the biggest attacks in history and has a serious risk. Following every major hacking incident, warnings are published for crypto currency investors. Because the new generation attackers are rather than credit cards, more and more and easy to booty crypto wallets.
Your account may be hacked
Facebook, Google, Apple And many other platforms were seized user information. This event, defined as the biggest leak in history, was confirmed hours ago. More than 16 billion user information has been leaked and researchers say that user information has been taken from 30 different data sets. Moreover, not only the stolen user names and passwords.
“This is not just a leak, but a plan for mass exploitation. With more than 16 billion signs of signing, cyber criminals have no such access to personal identity information that can be used for the capture of accounts, identity theft and high -target identity hunting.” – Researchers
Most of the data comes from malware. Fake versions of popular applications have achieved a huge cluster of attackers through malicious software hidden in original applications uploaded to non -secure websites and much more. Applications such as Telegram are available to the attackers, from the input tokens to direct user information.
This kind of big attacks are always happening, but this is the largest. For example, last year, Rockyou2024, ten billion unique password was leaked on hack platforms.
The CyberNews team will be worried about their data samples, which they have announced with a great headline.
What can crypto currency investors do?
There are many data clusters by drinking data from 3.56 billion to 90 million. Some of them contain user information of platforms such as Telegram and Google.
Alright crypto currency Where is the part of its investors? First of all, your accounts and e -mail addresses may be in the hands of the attackers. For such a large data set, the attackers have already run data scanning applications. These applications are looking for defi wallet words, account passwords and more money -saving keys in mails with passwords such as real user.
So what could be other than that?
- They can harm your environment with usual fraud methods from your social media accounts. Crypto currency Or promises such as distributing coupons are quite common.
- If they find that you have enough crypto currency to be worth a special operation, you can compare your accounts in other data sets and be the target of the attack after your information on different platforms and open source intelligence. They can make very complicated social engineering attacks for the information they find about you and enter into methods such as SIMSWAP.
- Your mail list, your social media friends can be the target of the victims. They can approach them by taking advantage of their confidence and infect them.
So what can you do? First of all, update the passwords of your accounts that may put you at risk financially in the crypto. Be sure to activate the phone verification in your accounts. Do not forget to use a different e -mail address, different passwords for each stock market even more important. We also mentioned in previous warnings, but it is useful to remind. Let your e -mail addresses be complex as your passwords, so it will be difficult to match your information on different data sets.
For example, telegram data and Facebook data sets have the same e -mail address and match. If the attacker is from your Facebook data crypto currency He was aware that you had investments. By accessing your Telegram account, you can rob you more easily or exploit the trust of people who trust you there.
One of the things you should do is to obtain premium anti-virus applications. For example, one of the most known Kaspersky and when you store your passwords in the safe storage area, when you transfer the passwords in your Gmail account, “Your passwords will be screened in the leak data published on the Internet” when you match, “change this in data leakage files come from the style.
All you have to do is never download applications from a place except for official websites.
Responsibility Rejection: The information contained in this article does not contain investment advice. Investors should be aware that crypto currencies carry high volatility and thus risk and carry out their operations in line with their own research.