Back

12 common attack vectors that you probably didn't know (second part)

Fake Uniswap airdrop site attempting to steal seed phrases from crypto users

As we talk in our part 1 of this series, there are common options that scammers use to attack us. They contact by different apps or websites that we utilize in our rutine, so it´s very important to know them. Let's keep completing the list to avoid scams.

7. Fake uniswap airdrop, V3, sync, etc

Fake uniswap stealing seed:

Fake Uniswap airdrop site attempting to steal seed phrases from crypto users

Fake Uniswap airdrop:

Fake Uniswap airdrop site attempting to steal seed phrases from crypto users

NEVER enter key or phrase! Especially in some dodgy site!

Uniswap clones about a node sync or version upgrade, scams.

Fake airdrop twitter uniswap

Fake Uniswap airdrop site attempting to steal seed phrases from crypto users

Remember on DISCORD:

Diagram showing risks of using the same device for crypto mining and wallet storage

8. Compromised device

Never mine crypto and use a wallet on the same device.

Always use 2FA, best bet is to have a separate Chromebook or Macbook or PC/laptop that is not used for every day use, but only for crypto.

This can be a scary one. Copy and paste the “correct” wallet, but actually it gets replaced by malware to scammers wallet!

Or hacked PC and signed transaction actually signs TWO transactions, one hidden in the background! OUCH!

- Or modified background.js or metamask to approve hidden transaction EVEN WITH LEDGER.

Another example

- Fake Uniswap ICO site, with a dodgy .exe (teamviewer RAT hidden silent depoy)

9. Fake Ledger and Trezor support

Ledger does not phone you. Nor do they want your backup phrase in a dodgy portal.

Fake ledger:

Example of fake Ledger and Trezor support sites phishing for private key information

Fake Trezor:

Example of fake Ledger and Trezor support sites phishing for private key information

10. Sim swapping

If you notice GSM service disruptions allay assume sim hack!

Use authenticator app, not SMS!

⚠ Enable SINGLE DEVICE MODE to prevent 2FA app being cloned (AUTHY)!

11. Social engineering attacks and sextortion

Be careful who you chat with and who is asking you for your mothers maiden name or your first pet.

Make sure to scrub off metadata from photos before sharing.

(i.e. I have a video of you doing bad stuff, send BTC to avoid getting exposed)

If you got an email that somebody has a shameful video of you and extorts you, it is a scam.

12. Fake wallets and google play store apps

For example TRON does not have an app yet, but hackers are uploading FAKE Tron apps to google play store, promising and airdrop.

Fake Polkadot
Sim swap attack illustration showing how scammers can take over mobile-based 2FA
Fake Tron Airdrop
Sim swap attack illustration showing how scammers can take over mobile-based 2FA
Fake Balancer app
Sim swap attack illustration showing how scammers can take over mobile-based 2FA

Fake Google Play Uniswap app wallets
Fake wallet apps on Google Play impersonating popular crypto wallets to steal user data
Fake wallet apps on Google Play impersonating popular crypto wallets to steal user data

NEVER ENTER SEED OR KEYS!

Fake software updates

DON´T DOWNLOAD ANYTHING FRO LINKS YOU GOT IN DMS!

 

Fake email showing an extortion scam demanding cryptocurrency in exchange for privacy
Fake email showing an extortion scam demanding cryptocurrency in exchange for privacy
Fake Graph foundation "mandatory" update (Remcos RAT)

Sim swap attack illustration showing how scammers can take over mobile-based 2FA
Fake Metamask

Metamask users are often invited to fake sites prompting them to enter seed phrase via various methods (email spam, scam DMs, twitter DMs, telegram and so on)

 

Sim swap attack illustration showing how scammers can take over mobile-based 2FA
Sim swap attack illustration showing how scammers can take over mobile-based 2FA

Another Metamask Scam:

Sim swap attack illustration showing how scammers can take over mobile-based 2FA

Another variation of a Metamask scam

 

Sim swap attack illustration showing how scammers can take over mobile-based 2FA

Another one

Sim swap attack illustration showing how scammers can take over mobile-based 2FA

Attack vectors such as domain squatting, executive impersonation, and SEO poisoning often go unnoticed by even vigilant internet users. PhishFort specializes in detecting and taking down phishing websites, mobile app clones, and fake social media content to protect your business and customers. By addressing these hidden but dangerous attack pathways, PhishFort ensures comprehensive brand protection from lesser known but potent cyber threats. Learn about phishing tactics targeting browser extensions in Chrome Extension Phishing and dive into phishing techniques in crypto with Phishing Enumeration | Understanding a Crypto Phishing Attack .


Test our Brand Protection Services

With PhishFort’s hands-free, fully managed service, you can trust us to safeguard your brand without delay, allowing you to focus on what matters most. Test our Brand Protection Services today and secure peace of mind with rapid, reliable protection from PhishFort.

Questions? Reach out to us on Twitter or Telegram.

Ensure your brand security and protect your business from attacks, starting today

Our advanced technology detects and takes down phishing websites, mobile app clones, and fake social media content.