Web3.0 Safety Guide

๐Ÿ’ฅ

Types of Hacking


ย 
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
notion image
ย 
See more

Types of Hacking #1. Phishing


The bigger the market size of crypto asset gets, the more phishing cases are reported lately.
These are some part of the phishing case, so please refer to it and take extra care in the future.
ย 
โš ๏ธ
Phishing Literally the combinaiton of Privatcy + Fishing. The most common type of cyber attack.
ย 
Seducing the users to connect to phishing sites in the middle of wallet connect with Dapps. source: https://blog.talosintelligence.com/2018/02/coinhoarder.html
Seducing the users to connect to phishing sites in the middle of wallet connect with Dapps. source: https://blog.talosintelligence.com/2018/02/coinhoarder.html
Typosquatting
  • Seduces the users to sophisticated fake site, appearing on the top of the search, and are automatically connecting the users to that site, if they make any typ-o when trying to connect to the official site.
  • Makes the interface very similar to that of the official service, tricking the users to undoubtedly insert their private keys.
ย 
ย 

Requiring the deposit of crypto assets though an email.
Source: https://www.publish0x.com/ghumat-trading/phishing-email-scam-spotting-red-flags-xrqzdm
Requiring the deposit of crypto assets though an email. Source: https://www.publish0x.com/ghumat-trading/phishing-email-scam-spotting-red-flags-xrqzdm
Email Spoofing
  • Phishing emails are disguising themselves as if they are from the official service.
  • This case sends a fake login page with a link with virus to steal the personal information ro directly requires personal information that an official service would never ask for.
ย 
ย 
Seducing the users to connect to phishing sites through SMS
Source: https://www.digitalshadows.com/blog-and-research/understanding-smishing-attacks/
Seducing the users to connect to phishing sites through SMS Source: https://www.digitalshadows.com/blog-and-research/understanding-smishing-attacks/
Smishing
  • Literally the combination of SMS & Phishing, seducing the users to connect to harmful sites through SMS.
  • They will steal important information by tricking users with fraud information like free coupons, and security settings
ย 
ย 
ย 

Types of Hacking #2. Pharming


ย 
๐Ÿ‘พ
Pharming Pharming is regarded as one of the phishings, but they are technically based on different mechanisms. Unlike phishings that lead users to connect to fake websites through fake information, Pharming spreads the virus code to the usersโ€™ devices and lead them to fake sites no matter which sites they try to connect to.
Distribution of malicious code
Distribution of malicious code
  • Hackers spread the virus codes on usersโ€™ digital device like PC and mobile, then contaminate DNS records
  • The user who has hacked will be redirected and connected to the fake sites regardless of typing in the correct address.
  • This is a very dangerous attack if the user doesnโ€™t recognize that he/she has been hacked.
ย 
ย 
ย 

Types of Hacking #3. Scam


ย 
๐Ÿ•ต๏ธ
Scam Scam literally means โ€˜confidence trickโ€™, tricking others in gambling. In crypto market, scam is also used as a negative term, meaning, tricking the others to make trades based on false information. Crypto projects that used this trick are called Scam projects (a.k.a scam coin, for cryptocurrency)
ย 
Scam is a type of crime that consists of the biggest ratio in crypto assets; the total scam reported was $7.7B om the United States 2021, increased by 81% from 2020. (Source: The Chain Analysis 2022 Crypto Crime Report)
ย 
The scale of crime is far bigger beyond individual level; the following case of South Korea explains us more.
ย 
ย 
Case 1. The so-called โ€œSamsung Coinโ€
  • They recruited investors by stating false information such as that coin mining is possible with all Samsung Electronics products and that it has received an ICO license number from the U.S. Federation.
  • They disappeared after collecting 21 billion won worth of investment from 1,300 people through continuous promotions.
ย 
ย 
Source: JTBC News, https://youtu.be/KWSgWGIsIGA
Source: JTBC News, https://youtu.be/KWSgWGIsIGA
Case 2. Shin-Il Gold Coin
  • Shin-il Group started promoting through various channels that it has discovered Donskoi, which contains 150 trillion won worth of gold bars, near Ulleungdo Island.
  • The plan to issue Shin-il Gold Coin linked to 150 trillion won in real assets (gold bars) attracted investors, through holding investment briefings, but it turned out to be a fraudulent act that actually had no project substance.
ย 
ย 
Case 3. Scam Sites Related to Doge-Coin (wowdoge etc,)
  • There was a scams site that lured the users that if you deposit Dogecoin for a certain period of time, they will be given interests.
  • This is a case of securing trust by installing actual mining and deposit and withdrawal functions, establishing a user-centered interface, and then closing the site after collecting a considerable amount of deposits by promoting high staking interest rates.
ย 
ย 
ย 

Types of Hacking #4. Rug Pull


ย 
๐Ÿคธ๐Ÿป
Rug Pull Also classified as one of the scams, Rug Pull refers to a way in which developers proceed with a project of coin and token that seems legitimate, receive investment from users, and then suddenly give it up halfway to reduce the value of coin and token. This is named Rug Pull because it is similar to pulling a rug and knocking the person on it over.
ย 
The case of damage caused by Rug Pull has been extremely increasing.
According to Chainalysis, a company that analyze blockchain data, Rug Pull has caused 2.8Billion USD, which is 65 times more than last years.
ย 
Top 14 of the 15 Rug Pull Damage was made in Defi Projects
Top 14 of the 15 Rug Pull Damage was made in Defi Projects
In particular, with a certain amount of technical know-how, new tokens can be created and listed on the Decentralized Exchange (DEX) at a relatively low cost, indicating that they are prevalent in the field of Defi.
There are several cases of Rug Pull damage in South Korea:
ย 
ย 
โ€œJindogeโ€
  • Jindoge which drew attention in May 2021 as Dogecoin's meme coin, is an example of a Rug Pull.
  • This is a case in which developers sold about 15% of the total volume at once after issuing Jindoge Coin, causing market prices to plunge 97%.
  • The developer closed its website and Telegram after the sale and they supposedly have earned about 2 billion won to 3 billion won.
ย 
ย 
โ€œSquid Tokenโ€
  • This token was issued under the theme of Netflix's original drama 'Squid Game'.
  • Developers promoted Squid as a game token in the 'Squid Game Project', which is based on the game motif in the drama.
  • Squid, which once rose to $2,861 (about 3.4 million won) during the day, plunged to $0.00079 due to Netflix's announcement that it had nothing to do with the drama and risk warnings from cryptocurrency analysts.
  • In the process, the developers supposedly have made a profit of about 2.1 million USD.
ย 
ย 
ย 

ย 
ย