Search

Nalezeno "Social engineering": 47

Decentralized Money Market Protocol Loses $4.3M in Social Engineering Attack


Tapioca DAO, has been the victim of a social engineering attack in which criminals exploited a vulnerability to compromise the ownership of the TAP token vesting contract. The breach led to the sale of 30 million vested tokens. A blockchain security firm detected suspicious activity involving...

Malicious Crypto-Stealing App Exposed on Google Play


An app on Google Play was discovered stealing cryptocurrency from users, employing advanced social engineering and trusted protocols. Check Point Research exposed the app after it had siphoned $70,000, deceiving over 150 victims. The attackers used the Walletconnect protocol to appear legitimate...

Social engineering attack, explained


Explore various types of social engineering attacks and find out how these manipulative strategies exploit trust and vulnerabilities, leaving victims vulnerable to financial loss

Concentric Confirms $1.6M Private Key Breach on Arbitrum Protocol


The liquidity manager app Concentric has fallen victim to private key exploitation on the Arbitrum network. According to the post on their official X account, the protocol confirmed the incident, revealing that the security breach resulted from a targeted social engineering attack on one of...

MacOS Malware KandyKorn Targets Crypto Owners


A new MacOS malware, known as KandyKorn and linked to the notorious Lazarus Group, has recently been identified. The malware was discovered by the Elastic Security Labs. According to an official report published by the blockchain security firm, KandyKorn relies on social engineering tactics...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace