CIA Officer Profile picture
Jan 21 7 tweets 3 min read
Awesome tip for using canarytokens.org/generate honeypot traps as a defence mechanism & #SIEM 🤯
1/3

There are three fun techniques for those who are constantly under attack.

One of them is to set up similar honeypots, IP loggers like “grabify dot link” and put a script for notifications.

👇👇👇
2/3

The second is to set up fake wallets, potential targets and name them tempting for the hacker. If you try to steal money from them (the hacker will probably notice them first), you can get a notification from @TenderlyApp or own script via SMS.

👇👇👇
3/3

Well, the third is a logical gate or logical bomb, when in order to turn on the system/PC you need to perform an order of non-obvious variable actions known only to you which are controlled by daemon/service.
Check out #OpSec guide github.com/OffcierCia/Cry… ❤️❤️❤️
Add to 2/3:

Worth mentioning, my old @SCRForum post about using frontrun as a defence mechanism smartcontractresearch.org/t/from-zapper-… So in certain conditions hacker won’t get any profit!

Thanks @shingen_crypto ❤️for notice:3

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with CIA Officer

CIA Officer Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @officer_cia

Dec 25, 2021
Warning ❗️ An attack on thematic @telegram crypto chats ongoing now. The attackers use an account named "Smokes Night" to spread Echelon malware by dropping a file into the chat room.

TLDR: Disable auto-downloading in Telegram settings right now.

👇 See the thread below 👇
@telegram 1/X

Here is a good article themed how to configure your TG, which don't have "out-of-the-box" privacy settings, correctly.

medium.com/immunefi/how-n…
Read 14 tweets
Nov 6, 2021
GN! Another very serious thread/manifest in which I would like to bring up an important problem. It is called cybersquatting. I will explain everything in details 👇
1/X So, let's begin. What exactly is cybersquatting? Cybersquatting is the bad-faith registration and use of a domain name that would be considered confusingly similar to an existing trademark, for example CADDNA.org or AppleProducts.com.
2/X Cybersquatters often conduct a variety of illegal and illicit practices: they can deliver malware, sell counterfeit goods, host phishing schemes, steal identities, and make money from deceptive advertising ruses.
Read 9 tweets
Nov 4, 2021
According to @_CPResearch_, users of the Metamask and Phantom crypto wallets, as well as the Pancake platform, were victims of a crypto-fishing scam that stole more than $500,000.

In this thread I ll try to explain how did attackers do that in my own words 👇 Image
1/X

When searching in google on crypto keywords such as “metamask” the spoofed links would appear at the top of search results. When clicked, the link would redirect to a “white” page and serve phishing content in the native language of the geographic region of the victim.
2/X

This attack method is called "cloaking". Cloaking refers to the practice of presenting different content or URLs to human users and search engines.

support.google.com/adspolicy/answ…
Read 11 tweets
Aug 16, 2021
In this thread I would like to tell you how to pass my #DeFi roadmap in an faster way 👇

Map: github.com/OffcierCia/DeF…
🔖 Learn the basics of Distributed Ledger Technology:

🔖 Elliptic Curve Cryptography: medium.com/coinmonks/lear…

🔖 Watch the video:

🔖 Read: medium.com/@preethikasire…

🔖 Read: blog.zeppelin.solutions/the-hitchhiker…

🔖 Watch: youtube.com/channel/UCJWh7…
📌Сheck out: solidity-by-example.org

📌 Read this study: arxiv.org/pdf/2106.10740…

📌 Don’t be afraid of using Google: powersearchingwithgoogle.com

📌 Сheck this tutorial: github.com/willitscale/le…

📌 Watch this intro: youtube.com/playlist?list=… and
Read 9 tweets
Jul 30, 2021
Today I would like to collect all good governance and DAO-related researches 🤔

Check the thread below
👇
arxiv.org/abs/2107.06790

Governing Decentralized Complex Queries Through a DAO
Collective intelligence and the blockchain: Technology, communities and social experiments

arxiv.org/abs/2107.05527
Read 16 tweets
Jul 30, 2021
Greetings, Dear Community! ❤️ Today I would like to tell you about blockchain forensics a bit more!

👇
To determine if a wallet is related to suspicious activity, services cluster addresses on the blockchain belonging to the same owner.  Clustering most often uses two heuristics: the total spend heuristic and the surrender heuristic.
The first clusters addresses that are separate inputs of the same transaction. Since different addresses send funds in the same transaction and have access to each other's private keys, we can assume that these addresses share the same owner.
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(