Authorities indicate that criminals would know that victims operate with cryptocurrencies, so they invite citizens to handle these issues more discreetly to avoid becoming a target for criminals.
Reports published by local media in the UK warn that criminals are looking to get hold of crypto-users’ phones to take control of their digital digital technologies are these electronic tools that have the ability to generate, store or even process data. assets.
Assailants steal phones to access victims’ cryptocurrencies
This is revealed in a report recently published by the media outletThe Guardian , which notes that many attackers are reportedly taking crypto-users’ phones by force, and the reports seem to indicate that the attackers have knowledge that the victims are trading cryptocurrencies, as they would next be emptying accounts on exchanges or on the devices themselves.
According to the media outlet, a police report to which they had access tells the story of a victim who was approached by assailants while asking for a Uber. The victim says that the criminals gave him back his phone, but when he checked his account an account is essentially a whose purpose is to track the financial activities of a specific asset/ at Coinbase is an American company that operates a cryptocurrency exchange platform. discovered that he had been robbed of some ETH valued at GBP £5,000.
Another victim recounted a similar case where her phone and bank cards were forcibly stolen. She later discovered that GBP £10,000 worth of crypto funds were stolen from her account within Crypto.com. El afectado sospecha que los asaltantes le hacían seguimiento, ya que durante su estadía en un bar accedió a su cuenta desde su celular, por lo que tiene la idea de que en algún momento vieron su clave privada.
Phones as a target for robbers
While the modus operandi seems to take on a much more violent tinge now, the truth is that crypto users’ phones have traditionally been one of the main targets for criminals looking to get their hands on victims’ cryptocurrencies.
Another of the most used methods is the fact of cloning/supplanting the SIM card of the victims, with which they could enable the cell phone number in another device and thus have control of the phone number to overcome the authentication authentication is a process that confirms a user's identity using passwords, SMS codes, fingerprints, and other forms of ownership proofs before granting access to sensitive and/or personal information. mechanisms via SMS. This would allow attackers to access the accounts of those affected in exchanges and/or crypto services through verification messages.
Since the phones are also often linked to the victims’ email accounts, they also take advantage of this to get hold of messages sent by services to request password changes and/or validate transactions.
UK authorities on alert
With an increasing number of cases reported, the director of the cryptocurrency cryptocurrencies are digital currencies that use cryptographic technologies to secure their operation. team of the cybercrime program of the National Council of Chiefs of Police Phil Ariss said that officers would be receiving more training to be on the lookout for cryptocurrency-related crimes.
The recommendation from Ariss is for people to avoid accessing their crypto wallets and/or exchange businesses that allow customers to trade cryptocurrencies for fiat money or other cryptocurrencies. accounts in public spaces:
“We are sure that no one would walk down the street carrying a wad of GBP £50 notes while counting them. The same should apply to people who own cryptocurrencies.”
On the other hand, the invitation is also to remember basic rules to avoid being victims, among which is not to reveal yourself as a user of cryptocurrencies in social networks or public spaces, be discreet about their financial activities, and of course avoid talking about these issues with strangers.
- Top 5 Largest DeFi a movement encouraging alternatives to traditional, centralized forms of financial services. Protocol the set of rules that define interactions on a network, usually involving consensus, transaction validation, and network participation on a blockchain. Thefts
- Hacker stole $1.7 million in NFT non-fungible tokens (NFTs) are cryptocurrencies that do not possess the property of fungibility. from founder of DeFiance Capital capital is most commonly defined as the large sum of money you would use to invest.
- Venezuelan authorities warn of phishing when a scammer pretends to be a trusted institution or person to trick people into revealing sensitive information such as Social Security numbers, passwords, banking details, etc., often through a malware link disguised as legitimate. scams via Whatsapp to steal cryptocurrencies
Version by Angel Di Matteo / DiarioBitcoin
Imagen de Unsplash