Buy Event Ticket

Crypto-Info Sites Under Attack: Third-Party Loopholes Leading to Scams

Crypto Info Sites Under Attack

Protecting Users and Platforms from Crypto Scam Pop-ups: Tools, Tactic

The news of hacking in the crypto market has been showing a new trend . Recently the news of Cointelegraph being hacked has come out. The trusted Platform suffered because of a third-party connection more specifically a site used for advertisement promotions. Users getting  pop-ups of receiving CTG token airdrop which almost worths $5,000 and endorsing viewers to connect their E-wallets to get the amount. Not long ago, the receiving of pop-ups like that was also reported from CMC’s site,alluding to connecting  wallets.Has the hackers set a different approach to target people. Websites like that are not directly connected to cryptocurrencies but still they are targeting them. For what?

What hacker’s mindsets are now?

  • Playing at Low Risk: Exchange or blockchain platforms are big platforms and too risky to hack. Platforms like that use a high level of security to prevent these kinds of acts. Instead hackers are targeting the site with low protocols to execute their plans. The sites that are not dealing in currencies generally didn’t pay attention to the minorities of infrastructures leading to the following results.

  • Third-party Contracts: The info site typically uses the third-party product to enhance their services. But the vulnerabilities in the framework of these Third-party service providers, give hackers great opportunities to break-in and insert their malicious codes.

  • Sailing with Built-in Trusts: The sites they target are already in the good books of customers. So, they use the trust of reputed sites to manipulate users to believe in them or in their fake deals. Users normally think of this as a site’s product and get into their trap.

  • A large source: Sites like that have a great number of customers. It's like a pond full of fish to threat-actors. Even if a small number of users of the site will benefit them significantly. Here they got a great number of possibilities with the lowest risks.

  • Fragile to track down: As their security norms are not so high and the policies also lack to collect enough information, it becomes really hard to track them down or any follow-ups will also be difficult to get.

Are service-providers at fault

They are partially, As the websites are not mainly dealing in crypto exchanges but serving as an information or reviewing sites, they are not forced to set-up with exorbitant infrastructures just to display data. Also, the cases are new to its kind, networks are not ready to deal with them as they unexpectedly encounter the trend. The use of third- party contents are justifiable because sites use them to cut-down the need of native products which need extra amount and efficiency.

But on the other hand, it can’t be denied that they are giving services and ensuring users trust their site’s authenticity. So, it is their call to maintain the contents. There’s a saying that great opportunities come with greater risks. If websites want to enjoy the surges it's their responsibility to protect the customer from any possible risks. To preserve their trust levels and popularity they need to take accountability for providing a more secure environment. If they are using any Third-party supplier, make sure that their policies meet the required safety norms and check for any possible loopholes that may cause problems in future.

What Service-providers can do to protect their customer

  • Use of firewalls can help to protect systems from unwanted or suspicious activities, like imperva, cloudflare, etc.

  • Including well defined policies or guidelines also works.

  • Keep networks and systems updated to avoid generating any time-binding vulnerabilities. 

  • Carrying out the tools that help in the monitoring of the network that are working as advertising providers (as recently in news).

  • Mechanisms like Datadog security, Snyk, Elastic security have to be used to  monitor the real time threats to stop them in the meantime.

  • Login at the backend has to be more secure. The approach of two factor authentication will work here as a gem.

  • Using vulnerabilities tools like Acunetix, Nessus, Sucuri help to find the possible or upcoming threats to the network.

  • Still after applying the necessary tools, companies need to be prepared for any mishap by securing data backups to meet future insurgency.

  • Securing Browsing by adding Security Headers (like strict-transport-security) will help to alleviate the exploitation risks.

What users need to understand

The world is moving to digitalization very swiftly. Everything is shifting to networks and on online platforms. As now payment systems are digitized they are becoming the most prone to be attacking reasons. Different tactics are being approached to manipulate customers to expose their credentials.Every digital platform is at risk of suffering, even if they are in the top lists. So, in place of depending on platforms solely users also need to take some measure by themselves  to protect their interests from any possible peril.

What users can do?

  • Avoid clicking on any random pop-ups or sites, generally if they are asking to connect wallets or offering alluring deals that look all good.

  • Keep any phishing features on alert while doing things online. Wallets like MetaMask or Rabby come with these features.

  • Using Ad-blocking tools also secure you from receiving any malicious messages. Tools like uBlock origin and Adguard will help.

  • Always pay heed to the URL. Malicious ones commonly use names as the authentic sites with a slight change to mislead the users.

  • Use hardware wallets (Ledger, Trezor, etc) for hefty amounts or additional security, so, even if you clicked on any link it needs extra physical confirmation to proceed.

  • Don’t skip to enable the safe browning options like firefox and anti-phishing while surfing online in an exposed environment.

  • Never avoid the latest updates on scams or safety procedures. You can follow official social channels like Twitter/X, Discord, etc,; for information.

What does it show?

Working in wide and open platforms may include hazards but with some precautions one can utilize the sources peacefully. Awareness is the key thing to escape most of the risks in this digital work. Hackers always use different techniques to disguise themselves but their motive is always the same. People with less information are most prone to get targeted. They change platforms, alluring customers with high returns or rewards. Sources that offer more than one can digest and also forcing in the name of time-bounding or limited offers, are commonly fraud ones. So, use of some measure can protect you from big losses.

Sudeep Saxena
Sudeep Saxena

Expertise

About Author

Sudeep Saxena is one of the co-founders of Coin Gabbar. Apart from developing the business, he is also a CMA by profession. Sudeep contributes to #TeamGabbar by writing geopolitical blogs.

Sudeep has an extensive experience in the crypto space and intents to build a rich knowledge bank in the form of blogs and articles, that shall develop a basic understanding of the crypto world for any new entrant in the market. When not writing, he can be found reading books. 

You can connect with Sudeep on Twitter and LinkedIn.

Sudeep Saxena
Sudeep Saxena

Expertise

About Author

Sudeep Saxena is one of the co-founders of Coin Gabbar. Apart from developing the business, he is also a CMA by profession. Sudeep contributes to #TeamGabbar by writing geopolitical blogs.

Sudeep has an extensive experience in the crypto space and intents to build a rich knowledge bank in the form of blogs and articles, that shall develop a basic understanding of the crypto world for any new entrant in the market. When not writing, he can be found reading books. 

You can connect with Sudeep on Twitter and LinkedIn.

Leave a comment
Crypto Press Release