CertiK hints on how not to fall for cryptocurrency scammers using “ice phishing”

CertiK hints on how not to fall for cryptocurrency scammers using ice phishing

One of the leading blockchain security companies addresses the needs of Web3 users and hints on how to avoid a hacking attack. We recommend reading these tips!

Ice Phishing a new threat

CertiK was founded in 2018. The fathers of the company are Columbia and Yale professors. The company’s mission is to use the best possible technology, backed by artificial intelligence, to secure and monitor blockchain, smart contracts and Web3.

The latter area has become particularly important for the company recently. This is because it turns out that Ice Phishing has become popular in the Web3 space. This form of attack was first identified by Microsoft, earlier this year.

The specifics of Ice Pishing are based on an attempt to convince the victim, to sign authorizations that lead to the release of tokens held by the victim. One of the most recent attacks of this kind was registered on December 17. At the time, 14 Bored Apes were stolen. Eventually, these NFTs ended up on the market and were liquidated for relatively small amounts. As CertiK representatives argue, this attack is quite simple:

“All the hacker has to do is make the user believe that the malicious address he is giving permission to is legitimate. Once the user approves the fraudster’s permission to issue tokens, then the assets are at risk of being drained.”

Take advantage of Etherscan

CertiK representatives suggested using token approval tools, as well as the blockchain explorer Etherscan. The latter can help revoke permissions for addresses that users don’t recognize. 

The explorer can also be used to verify users for suspicious activity. This kind of activity is, for example, a given address’s historical use of mixers such as Tornado Cash. It is also important to interact with sites that are official. Such entities are easy to verify. In turn, it is recommended to use social media with caution. An example of this is Twitter, for example, where it is possible to come across fake cats of some networks.

Take some time to take care of your security

The company also advised to use information aggregators such as CoinMarketCap, or CoinGecko. It is there that you can verify individual URLs, in the context of linking to legitimate sites.

About the need to counter Ice Pishing, Microsoft already reported on February 16. It pointed out that it is essential that Web3 projects and wallet providers take care to enhance security at the software level. CertiK seems to understand this problem very well and aims to support building the right solutions.

Disclaimer: Blockbulletin does not take accountability of investments based on the information of the website. We highly advice readers to make extensive research prior to any invest

Share this article

More news

All articles loaded
No more articles to load

Learn

Bitcoin blocks

What are Bitcoin blocks?

Bitcoin (BTC) is currently one of the most popular digital currencies in the world. How does it differ from the…
Bitcoin forks

Bitcoin forks

Bitcoin’s history, although short, is quite bumpy. The reason for this is not only the dynamic price movements or the…
Ripple

What is XRP?

XRP is one of the top cryptocurrencies on the market. A project with a long and also quite controversial history…
What is Vechain VET

What is Vechain (VET)

The next cryptocurrency we take under the microscope is VeChain (VET). We will take a look at what sets it…
what is uniswap uni

What is Uniswap (UNI)?

In the article titled “What is Binance Coin (BNB),” we illustrated an exchange that, for the purpose of its business,…
Terra LUNA

What is Terra (LUNA)?

This time we take a look at another project that dived deep into the hearts of investors. What exactly is…
What is Stellar Lumens XLM

What is Stellar Lumens (XLM)

Some projects in the cryptocurrency world, although independent, are interrelated. One example is Litecoin, commonly referred to as Bitcoin’s little…
All articles loaded
No more articles to load

Analyses

All articles loaded
No more articles to load

Latest news

All articles loaded
No more articles to load