1. The difference between different phishing techniques:
1. phishing: community 2. spear phishing: targeted members of the community
3. whaling: brand owner 4. vishing: by phone 5. smishing: send messages by text 6. Angler phishing: sending direct message within social media 7. Pharming: malicious actors hijack a Domain Name Server (DNS), the server that translates URLs from natural language into IP addresses
8. Evil Twin: fake WiFi hotspot, often making it look legitimate, that might intercept data during transfer. 9. Watering hole phishing: threat actors research around the websites a brands employees visit often, then infecting the IP address with malicious code or downloads.
2. Ways people are being targeted in phishing attacks:
- Twitter: flexing or putting opensea url in Twitter bio
- discord
- Instagram
- etherscan
Anything that could trace large amounts of eth, or NFT collectors, or high valued NFTs or all the above
3. How to reduce being a target
1. don't be a target 2. don't show off NFTs in Twitter profile 3. don't have opensea url in Twitter profile 4. have different username on Twitter and discord along with pfp.. less chance of someone following you and starting to monitor data.
5. Don't respond to anything that's "urgent" right away 6. Never accept free wifi 7. Review spelling issues in url 8. Make sure the website is https not just http 9. Zero trust anyone in the DMs 10. Watch out for links in text messages
11. Avoid calls you don't know unless you're expecting a call that's not saved (if it's an unusual location - don't pick up) 12. Avoid messages from a brand owner that has never contacted you before unless you can really verify them 13. Watch out for shorten or hypertext urls
4. If compromised - what to do (next steps)
In order:
- cut off wifi
- scan devices
- reset ALL passwords including social media and centralized bank
- store passwords in a password manager
Make sure you're up to date on news around the devices you own. Have zero trust and do your research. Just trying to spread cyber security awareness to the NFT community.
Someone on #NFT spaces asked me about other ways threat actors can gain more user Intel without computer or phone.. Besides Christmas lights? Some toys that have bluetooth can be comprised and threat actors can use to spy or listen in on some conversations..
👇
1. Fisher-Price Chatter bluetooth has no secure pairing process. Threat Actors can exploit this in an audio bug.
2. "My Friend Cayla" bluetooth also has similar issues.