What methods do hackers use to steal encrypted assets? How should we prevent it?
● Hackers in the cryptocurrency space are everywhere, the most skilled hackers are distributed in places like North Korea and Russia
● Malware and backdoor programs: Hackers install malware on macOS and Windows systems to create backdoors, allowing them to continuously access the victim's computer
● Phishing emails and internal vulnerabilities: Hackers send phishing emails to lure people into downloading malware, thereby gaining control over the server
● Hardware wallet attacks: Hackers create fake hardware wallets to steal user keys
● Server hacking and cross-chain bridge attacks: Hackers successfully carried out large-scale fund thefts by controlling validator nodes of cross-chain bridges
● Phishing links and online scams: 19-year-old hacker Remington Ogletree exploited vulnerabilities in telecom companies by sending phishing links to induce users to leak sensitive information, and defrauded cryptocurrency via phishing links, causing a total loss of 4 million dollars
※ WIFI/Public Networks: In public WiFi environments, hackers can set up a fake hotspot with a name similar to legitimate WiFi. Once users mistakenly connect, attackers can steal various information during their internet usage
※ Power banks: Many incidents have occurred where power banks steal user information. Hackers use built-in chips and trojan programs in power banks, allowing complete invasion of mobile devices, enabling them to see all information and even modify the power bank into a listening device and locator, disguised as an ordinary power bank to eavesdrop
How to prevent it:
1. Use Apple devices as much as possible, because Apple systems are fully closed, keep software updated, and use complex passwords
2. Beware of phishing websites, emails, and links; do not click casually
3. Do not connect to public WiFi networks, do not use external power banks!
4. In addition to screen passwords, you can also set passwords for accessing exchange and wallet apps
5. Try not to take photos of private keys, do not store them online; consider distributed storage or use hardware wallets
6. Be cautious of people taking your phone; men should be wary of your mistresses, second mistresses, third mistresses... haha!