• Skip to primary navigation
  • Skip to main content
  • Skip to footer
OpSec Security

OpSec Blog

  • Events
  • Partners
  • Brand
      • OpSec protects your entire brand continuum, covering every facet of your product’s life cycle. From conception through consumers, both online and offline, we provide you with valuable insight to protect your revenue streams, product integrity, and brand reputation.

      • Licensing
      • Fashion & Apparel
      • Luxury Goods
      • Consumer Products
      • Automotive
      • Industrial
      • Pharma & Medical Devices
      • Transaction Cards
  • Government
      • Working closely with key commercial partners, government agencies and security specialists, we have earned a reputation as innovators in combining digital solutions with optical and material sciences.

      • Revenue Protection & Tax Stamps
      • Security Foils & Labels
      • Vehicle Protection & SecureETags
  • OpSec Online
      • OpSec Online includes an industry-leading product and service line to help brands combat brand abuse across all online spaces.

      • Why Brand Protection
      • AntiCounterfeiting
      • AntiPiracy – Digital Media
      • AntiFraud – Phishing
      • AntiFraud – Malware
      • Partner Compliance
      • Online Brand Protection
      • IP Protection
      • AntiPiracy – NetResult Live Streaming Protection
      • AntiFraud – Dark Web & Cyber Intelligence
      • Managed Services
  • Resources
  • About Us
      • In a world getting more complex, OpSec helps ensure the integrity of goods and documents that build deeper and more profitable relationships.

      • Leadership
      • Associations
      • Careers
  • Contact Us

Cryptocurrency users falling prey to phishing schemes

OpSec Security

by OpSec Security

antifraud | antiphishing | High Security | Network Intelligence

Once upon a time, a phishing email would nearly always impersonate a financial organization, would be poorly written and easily recognizable.

Today, there are many ways that phishers can target organizations, employees and consumers – and multiple avenues that they take to do so. As society becomes increasingly dependent on online processes, phishers become more innovative in capitalizing on those practices.

Case in point? Cryptophishing, a new form of online phishing that has surfaced with the advent of cryptocurrency in online financial practices. We’ll delve into this, but first, let’s review some background on cryptocurrency.

What Is cryptocurrency?

As of this writing, there are 2,004 identified cyptocurrencies and more than 14,000 cryptocurrency markets. Here is an excellent infographic on cryptocurrency, and below are key crypto terms to know:

  • Cryptocurrency/Coin/Token: In simple terms, cryptocurrencies can be called a tokens, where each token is simply 1 unit of value of that cryptocurrency. The ownership of cryptocurrency tokens is recorded on a digital ledger (generally a blockchain).
  • Blockchain: A database protocol. In cryptocurrency, a blockchain is a distributed digital public ledger where transactions and balances of a given cryptocurrency are recorded. It is secured using cryptographic hashes. Not every cryptocurrency is blockchain-based. One should note that blockchains can do more than act as ledgers of transactions, they can store any sort of data in sequential blocks (their potential and the potential of other hash-based systems is endless as far as the potential of databases goes).
  • Cryptocurrency Wallet: Software that allows you to create cryptocurrency transactions and see balances associated with cryptocurrency addresses. Or more specifically, in wallets where you control your private keys, software that lets you access balances associated with your private and public keys and create a transaction using your private keys (see “keys” below for an explanation). NOTE: With some wallet types, like custodial wallets on exchanges, you don’t manage your private keys direction but show an address where a balance is stored. These too can be described as a wallet.
  • Keys (Cryptographic Keys): Cryptocurrency is largely based on public-key cryptography. The concept is that one key can be known publicly (the public key) and the other can’t (the private key). A public address is the public account number people can send coins to; it a has a public key, which is a hash of a private key. The private key is a unique personal password from which coins can be sent by creating a signature (i.e. an encrypted version of the private key). Users should never share the private key as it is the root of all information needed to access a cryptocurrency wallet.

How cryptophishing works

Cryptographic keys are the primary reason that cryptophishing is becoming more prevalent. The anonymity of cryptocurrency wallets makes stealing them easier than traditional phishing, which targets bank accounts and must elude security measures to transfer money and then launder it.

Cryptophishing attacks are highly targeted, and costlier for offenders to organize, because of their higher return on investment. Emails are often customized to the recipient and look legitimate. Because these emails are so highly targeted, they can be harder to detect and may not be flagged as suspicious.

Further complicating matters, cryptophishing tends to leverage various forms of distribution other than email. Cryptophishers have been known to use social media to distribute phish. Fake social media profiles, for example, might look like a well-known and legitimate cryptocurrency social group and target members of that group. Cryptophishers have also been known to purchase ad words and put links to phishing sites in paid search engine listings.

Cryptophishing emails can impersonate any entity of a cryptocurrency process including web wallets, cryptocurrency exchanges, blockchain, etc. The vulnerability comes primarily from when a user accesses their crypto wallet online or through mobile devices (rather than on a computer or external device with a hardcoded and protected private key).

In the phishing example above, a phishing site attempts to access a user’s cryptocurrency wallet by requesting private keys, mnemonic phrases or specific file information.

Summary

As cryptocurrencies become more prevalent there will be an increase in phishing attacks targeting all parts of the cryptocurrency process. As with any new financial endeavor, vulnerabilities will stem from the human element falling prey to social engineering.

Securing logins and private keys for cryptocurrency wallets is paramount. The anonymity of the process prevents exchanges, currencies, or wallet software from taking on responsibility for any losses due to phishing. Unlike traditional banks, there isn’t insurance to cover losses due to fraud.

Further reading on cryptocurrency basics:

https://cryptocurrencyfacts.com/
https://blockgeeks.com/guides/what-is-cryptocurrency/
https://www.investopedia.com/articles/investing/082914/basics-buying-and-investing-bitcoin.asp

antifraud, antiphishing, blockchain, cryptocurrency, cryptographic keys, cryptophishing, financial protection, information protection, phishing

OpSec Security

About OpSec Security

In a world getting more complex, OpSec helps ensure the integrity of goods and documents that build deeper and more profitable relationships.

Related Post

Confused businesswoman annoyed by online problem looking at laptop

OpSec Security 5 Min Read Mar 25, 2020

Prepare to be Scammed: How People Can Make the Difference

The year 2020 came in with a bang and it hasn’t let up yet. From the UK’s Brexit initiative, the US Presidential election ...

antiphishing, bec scam, business email compromise, covid, cyber security, cybercriminals, eac, eac scam, email scam, ncsc, phishing, scam, w-2

Surfers in the ocean

OpSec Security 2 Min Read Oct 25, 2019

Unpacking brand protection (in time for the holidays)

The internet has a lot to answer for. While both consumers and brands have the world at their fingertips thanks to the int...

antifraud, data protection, hospitality, online brand protection, online consumer, travel industry, travel protection

Access granted

OpSec Security 2 Min Read Oct 22, 2019

Deep diving into the dark web

Much of our perception of the dark web is limited to what we see on TV — a hub for criminals, illicit goods and illegal ac...

Brand Protection, customer education, dark web, data breach, deep web, hack, illicit goods

Footer

Careers

Be a part of a collaborative global team determined to fight counterfeits and build strong, lasting partnerships with our clients.

View Available Positions

Brand

  • Licensing
  • Fashion & Apparel
  • Luxury Goods
  • Consumer Products
  • Automotive
  • Industrial
  • Pharma & Medical Devices
  • Transaction Cards

Government Applications

  • Revenue Protection & Tax Stamps
  • Security Foils & Labels
  • Vehicle Protection & Secure eTags

© 2021, OpSec. All rights reserved. Modern Slavery Statement Privacy Terms Of Use Contact Us

Facebook Twitter LinkedIn YouTube Instagram