Top Five Crypto Red Flags on Social Media
Some scams are easy to see, but others might look like a worthwhile investment opportunity. Here are some crypto red flags to look out for.
In 2024, with the rise of artificial intelligence, machine learning and communication robots, it is almost impossible to know if you’re talking to a human or coding. It gets more complicated still, not knowing if that entity has your best interests at heart or if they have a hidden – malicious – agenda.
Social engineering is the most common and successful method an attacker will use to gain access to your private information, and the attacks can be more sophisticated than one might realise.
Knowing who and where to trust can save you, your data, your company’s secure information and your money.
IBM‘s 2023 Cost of a Data Breach report notes:
According to Statista,
The number of unique phishing sites detected worldwide sat at a massive 1.35 million in 2023.
Social Engineering is a technique used by scammers to gain access to a user’s credentials by eliciting the information directly from the user. This is usually done by pretence, with the scammer posing as an authority or credible figure.
The official Computer Hacking Forensics Investigator defines it as “a means to commit fraud on another through a confidence trick or other means of disseminating false information.”
Social engineering relies on a manipulation of a person’s ability to trust.
Social engineering is by no means a new tactic, but the introduction of emerging technology leaves more and more vulnerable to falling prey to ever-increasing sophisticated attempts.
There are two types of valuable information that a malicious entity might seek out:
Type 1 (valuable information):
Type 2 (open source intelligence):
An attacker can use Type 2 information to construct an authoritative identity and can engage with you in a manner in which you’ll trust because it feels as if they are who they say they are or a person you know.
It’s paramount to safeguard yourself against social engineering. Not just for your private data only but for your company’s information too. Once a scammer has your secure information, they can often access other aspects of your data.
One of the most important things to remember when engaging online is to be hesitant to trust. Artificial intelligence, machine learning, and bots can be used to craft communication to align exactly with the tone of a person you know or trust. Keep your online and private data offline as much as possible. Where possible:
Rather aim for scepticism than risk an attacker gaining access to your credentials. Before continuing any online engagement, verify the legitimacy of any entity that engages with you first, no matter the channel. Cross-check details thoroughly.
A sense of urgency coupled with an emotional appeal can derail a person’s rational decision-making. Resist acting to any pressure tactics and take a patient, slow approach to someone looking for information. Many attackers will look for a quick score and authentic communication platforms are less likely to create any urgent compliance.
Knowing what to look out for can make spotting these attacks easier to avoid. Awareness of the common tactics can also help others. If you see any suspicious activity, share it with your company, family, and friends.
Some companies will use real-world scenarios in successful social engineering attacks to showcase the methods commonly used. If your company offers training in this, consider signing up to get to know the attacks. Knowledge is power and knowing what to avoid can save you and your data down the line.
Some scams are easy to see, but others might look like a worthwhile investment opportunity. Here are some crypto red flags to look out for.
After Kate Middleton's alleged data incident and possible internal attack at the London Clinic, there's a clear need for security in cyber...
A guide on how to buy Bitcoin using a credit card for first time users and steps to use when registering an account.
There are a few key differences between a spot Bitcoin ETFs and other Bitcoin ETFs in how they are structured and direct exposure to...