Social Engineering
Search documents
X @Bankless
Bankless· 2025-07-23 15:45
Crypto Security Threats - Crypto scams are increasing with the bull run, including phishing, impersonation, fake airdrops, and malicious links, primarily spread on Crypto Twitter [1] - Attackers use phishing and social engineering on X and in inboxes to gain trust and extract sensitive information like private keys or to get users to sign malicious transactions [1] - Scammers impersonate others in crypto by copying profiles, bios, job titles, and links to build rapport and send phishing links or pretend to be from a company to send malicious invites [2][5] - Even verified accounts can be compromised and used to post phishing links, and trusted site frontends can be hijacked [2] Safety Measures - Industry recommends double-checking URLs and exiting immediately if something looks off, and never sharing screens or private keys [4] - Legit teams will not cold DM to "verify" anything, and users should be wary of DMs, even from known contacts [4] - Industry advises users to look closely at usernames (e g "0" vs "O") and verify identities by contacting the company or person directly [5] - Users should pause and think before acting, heed browser wallet phishing warnings, and watch out for shortened links [7] - Industry suggests using multiple wallets and not keeping primary funds in a hot wallet, regularly revoking token approvals, and assuming any link or account could be compromised [7] - Using app-based 2FA and following security researchers is recommended [7]