CertiK hints on how not to fall for cryptocurrency scammers using “ice phishing”

CertiK hints on how not to fall for cryptocurrency scammers using ice phishing

One of the leading blockchain security companies addresses the needs of Web3 users and hints on how to avoid a hacking attack. We recommend reading these tips!

Ice Phishing a new threat

CertiK was founded in 2018. The fathers of the company are Columbia and Yale professors. The company’s mission is to use the best possible technology, backed by artificial intelligence, to secure and monitor blockchain, smart contracts and Web3.

The latter area has become particularly important for the company recently. This is because it turns out that Ice Phishing has become popular in the Web3 space. This form of attack was first identified by Microsoft, earlier this year.

The specifics of Ice Pishing are based on an attempt to convince the victim, to sign authorizations that lead to the release of tokens held by the victim. One of the most recent attacks of this kind was registered on December 17. At the time, 14 Bored Apes were stolen. Eventually, these NFTs ended up on the market and were liquidated for relatively small amounts. As CertiK representatives argue, this attack is quite simple:

“All the hacker has to do is make the user believe that the malicious address he is giving permission to is legitimate. Once the user approves the fraudster’s permission to issue tokens, then the assets are at risk of being drained.”

Take advantage of Etherscan

CertiK representatives suggested using token approval tools, as well as the blockchain explorer Etherscan. The latter can help revoke permissions for addresses that users don’t recognize. 

The explorer can also be used to verify users for suspicious activity. This kind of activity is, for example, a given address’s historical use of mixers such as Tornado Cash. It is also important to interact with sites that are official. Such entities are easy to verify. In turn, it is recommended to use social media with caution. An example of this is Twitter, for example, where it is possible to come across fake cats of some networks.

Take some time to take care of your security

The company also advised to use information aggregators such as CoinMarketCap, or CoinGecko. It is there that you can verify individual URLs, in the context of linking to legitimate sites.

About the need to counter Ice Pishing, Microsoft already reported on February 16. It pointed out that it is essential that Web3 projects and wallet providers take care to enhance security at the software level. CertiK seems to understand this problem very well and aims to support building the right solutions.

Disclaimer: Blockbulletin does not take accountability of investments based on the information of the website. We highly advice readers to make extensive research prior to any invest

Share this article

More news

All articles loaded
No more articles to load

Learn

CBDC

The great reset and the CBDC

The World Economic Forum (WEF), which regularly takes place in Davos, Switzerland, for pandemic reasons, has taken the form of…
Proof of work and Proof of stake

Proof of Work and Proof of Stake

There are several methods available in blockchain for securing networks and verifying transactions. The two most popular are consensus algorithms…
public and private blockchains

Public and Private Blockchains

When analyzing the cryptocurrency market, we may come across terms related to blockchains. The two most popular types of them…
Satoshi Nakamoto

Who is Satoshi Nakamoto?

The world’s biggest cryptographic mystery remains unsolved to this day. It is speculated whether Satoshi Nakamoto is a single person…
What is bitcoin BTC

What is Bitcoin (BTC)?

Bitcoin (BTC) is the oldest and most recognized cryptocurrency in the world. Its origins date back to 2008 when its…
Is Bitcoin anonymous

Is Bitcoin anonymous?

Interested users are actively seeking answers to the question: is Bitcoin (BTC) anonymous? In this article, we will try to…
All articles loaded
No more articles to load

Analyses

All articles loaded
No more articles to load

Latest news

All articles loaded
No more articles to load