Bitcoin Forum
May 10, 2024, 04:57:11 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Some common ways to discover phishing attacks  (Read 234 times)
hd49728
Legendary
*
Offline Offline

Activity: 2086
Merit: 1028



View Profile WWW
April 29, 2023, 11:19:14 AM
 #21

This is still one of the simplest methods I use to identify phishing sites. Despite the fact that hackers and fraudsters are becoming more knowledgeable and devious by the day, the addition of "s" to the "http" which indicates that the website is encrypted and secured with a Secure Sockets Layer (SSL) certificate remains the simple check I use on phishing sites. The SSL certificate provides additional security and protection to websites.

Nonetheless, phishers have begun to use 'https://,' so this aspect is no longer a sure sign.
What is SSL?
SSL vs TLS!

SSL is a better standard but it is not too difficult to get so it is not a perfect indicator to say a website is a scam site, phishing site or not.

Quote
Another technique to check for phishing URLs is to pay special attention to the spelling. Fake websites usually feature an extra letter 'S' or 'A' in the spelling. For example, an authentic Google URL is google.com, whereas a forgery may be googleS.com.

Also, if the letter 'O' has been replaced with the number '0' (zero). For example, an authentic Bitcoin URL is bitcoin.com, whereas a forgery could be bitc0in.com.
This is called as Homograph phishing type.
Punycode and how to protect yourself from Homograph Phishing attacks?

.freebitcoin.       ▄▄▄█▀▀██▄▄▄
   ▄▄██████▄▄█  █▀▀█▄▄
  ███  █▀▀███████▄▄██▀
   ▀▀▀██▄▄█  ████▀▀  ▄██
▄███▄▄  ▀▀▀▀▀▀▀  ▄▄██████
██▀▀█████▄     ▄██▀█ ▀▀██
██▄▄███▀▀██   ███▀ ▄▄  ▀█
███████▄▄███ ███▄▄ ▀▀▄  █
██▀▀████████ █████  █▀▄██
 █▄▄████████ █████   ███
  ▀████  ███ ████▄▄███▀
     ▀▀████   ████▀▀
BITCOIN
DICE
EVENT
BETTING
WIN A LAMBO !

.
            ▄▄▄▄▄▄▄▄▄▄███████████▄▄▄▄▄
▄▄▄▄▄██████████████████████████████████▄▄▄▄
▀██████████████████████████████████████████████▄▄▄
▄▄████▄█████▄████████████████████████████▄█████▄████▄▄
▀████████▀▀▀████████████████████████████████▀▀▀██████████▄
  ▀▀▀████▄▄▄███████████████████████████████▄▄▄██████████
       ▀█████▀  ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀  ▀█████▀▀▀▀▀▀▀▀▀▀
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.PLAY NOW.
1715317031
Hero Member
*
Offline Offline

Posts: 1715317031

View Profile Personal Message (Offline)

Ignore
1715317031
Reply with quote  #2

1715317031
Report to moderator
The block chain is the main innovation of Bitcoin. It is the first distributed timestamping system.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715317031
Hero Member
*
Offline Offline

Posts: 1715317031

View Profile Personal Message (Offline)

Ignore
1715317031
Reply with quote  #2

1715317031
Report to moderator
touseefahmad1999
Member
**
Offline Offline

Activity: 966
Merit: 10

Allah is the Greatest


View Profile WWW
April 29, 2023, 12:46:48 PM
 #22

Phishing attacks are a common form of cyber attack that attempt to trick individuals into revealing sensitive information such as usernames, passwords, and credit card details. Here are some common ways to discover phishing attacks:

Check the email sender: Be suspicious of emails that appear to come from a legitimate company or organization but use a slightly different email address or domain name. Always check the sender's email address to ensure it matches the official address of the company or organization.

Look for grammatical errors: Many phishing emails contain grammatical and spelling errors. Legitimate companies and organizations usually proofread their emails to ensure they are free of errors.

Beware of urgent or threatening messages: Phishing emails often contain urgent or threatening messages that attempt to create a sense of urgency or panic. Be cautious of such messages and always verify the authenticity of the email with the company or organization.

Check the links: Hover over the links in the email to check if they lead to a legitimate website. Phishing emails often contain links to fake websites that mimic the official website of the company or organization.

Don't enter personal information: Legitimate companies and organizations will never ask for personal information such as passwords, credit card details, or social security numbers in an email.

Use security software: Use security software, such as antivirus and anti-malware programs, to protect your computer from phishing attacks.

Keep software up to date: Keep your software up to date to ensure that you have the latest security patches and updates to protect your computer from known vulnerabilities that can be exploited by phishing attacks.

In summary, be vigilant and cautious when opening emails and always verify the authenticity of the email with the company or organization before entering any personal information.

⬣⬣⬣⬣⬣⬣⬣⬣    ⬣⬣⬣⬣    ⬣⬣    ⬣     C O M B O     ⬣    ⬣⬣    ⬣⬣⬣⬣    ⬣⬣⬣⬣⬣⬣⬣⬣
A leading provider of scaling solutions for Web3 game developers
|      Twitter      |    Telegram    |     Discord     |     Medium     |      GitHub      |
AakZaki
Legendary
*
Offline Offline

Activity: 2310
Merit: 1076


zknodes.org


View Profile WWW
April 30, 2023, 07:00:38 PM
 #23

The most common thing done by scammers is usually to create websites with almost similar URLs, even very similar with the same alphabet but only different in the type of letters used such as i and I and many others. this even deceived users and eventually many were trapped.
The website template used is also the same and very similar. to make a phishing website like that, of course, requires good website development skills and considerable costs, but it can trap many victims.
Get used to bookmarking real websites that you want to visit such as Exchange and several other crypto sites.
Assface16678
Full Member
***
Offline Offline

Activity: 1372
Merit: 134


★Bitvest.io★ Play Plinko or Invest!


View Profile
May 01, 2023, 09:12:19 AM
 #24

Phishing is an act of getting people's personal information like usernames, passwords, credit card details and many more through sending fake messages, fake emails and a lot more claiming they are good people and wanted to help.
Phishing assaults are a popular sort of cyber assault in the crypto realm, and they can result in considerable financial losses.

Phishing has become a huge problem within cryptocurrencies and it is getting bigger day by day. Every day new people are getting involved in crypto, while phishers are seriously engaged in scamming newbies in crypto that is why people still see crypto as a way of scamming. I create this post to help everyone, especially newbies to be careful with the type of browser and also any site that involves phishers, and also  some ways to discover phishing attacks in the crypto space.

       Ways to identify phishing attacks
Ways to discover phishing attacks In the crypto space
Identifying phishing attacks is a little bit more difficult because phishers are very intelligent to go extremely higher for the message and the website looks too real and legit.

1. Grammar error: This happened as a result of being hurried up to send the message out, they do not even have time to go through what they have written.

2. Copycatting: In this aspect, you have to get familiar with the brand, logo, and poster, of the organisation's website. All mentioned can be manipulated if you didn't recognize them from the website.

3. Check the URL: Always be vigilant of any link that requires you to insert your personal information. Ensure to check the URL, because the scammer always uses websites with URLs. After checking the URL and is legit then HTTPS in the URL, if there is S at the end the website is secure for your personal information, but if not included then run away from the site.

4. Trust but verify: if a message or email is sent to you either by your friend or someone else, you must check the message thoroughly before clicking on the link. Phishers can do and undo, always scrutinize the email and also the authenticity before taking action.

5. Use a hardware wallet: use a secure wallet that has two-factor authentication, hardware wallet is a device that can see and handle which cryptocurrencies are kept offline. Attackers find it very difficult to access your crypto, private key, using scam websites.


Above mentioned are out of many detectors of phishing attacks, there are many more apart of above mentioned but following these tips can guide you away from phishing attack in the crypto space. Any form of an idea are welcome.
I experienced phishing sites and I noticed that their site is wanting your some information already like address or some password and pin related to your account. There's a lot of phishing website and they're copying the original site like metamask and ronin and when you go in that site they want to type your seedphrase there so quickly and I'm thinking that is a scam website. Avoid these kind of scam. thankyou and welcome!!

Ziskinberg
Hero Member
*****
Offline Offline

Activity: 2926
Merit: 636


For campaign management look for Little Mouse!


View Profile
May 01, 2023, 09:56:53 AM
 #25

I experienced phishing sites and I noticed that their site is wanting your some information already like address or some password and pin related to your account. There's a lot of phishing website and they're copying the original site like metamask and ronin and when you go in that site they want to type your seedphrase there so quickly and I'm thinking that is a scam website.
They usually attack known sites and it was possible to become their victim if you're not carefully reading the site's address, the typo errors, etc. We should be practical with these because scammers will try to take advantage of those who are not really familiar with the site. Because as we can see, the entire page is really the same and you can really think it was the real one but after all, it was a phishing site.
I suggest to bookmarks the legit or original site as possible so we won't need to search it because of so many links that will appear which will confuse us.

▄▄███████▄▄
▄██████████████▄
▄██████████████████▄
▄████▀▀▀▀███▀▀▀▀█████▄
▄█████████████▄█▀████▄
███████████▄███████████
██████████▄█▀███████████
██████████▀████████████
▀█████▄█▀█████████████▀
▀████▄▄▄▄███▄▄▄▄████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀
.
 MΞTAWIN  THE FIRST WEB3 CASINO   
.
.. PLAY NOW ..
Kavelj22
Legendary
*
Offline Offline

Activity: 1750
Merit: 1453


🔃EN>>AR Translator🔃


View Profile
January 27, 2024, 08:12:15 PM
 #26

I will talk about protection measures in cases of email phishing: All protection rules can only be practiced by an expert user who has sufficient experience dealing with issues of this degree of sensitivity, especially with regard to funds and any financial activity. This explains the occurrence of large numbers of victims in all the cases we hear about.

There are degrees in evaluating the level of impact of each hacking operation, and these recent operations were at the simplest level that is still possible and achieve profits. The degree of professionalism of the process is determined by the profits it has achieved.

The most important thing that we can advise any user in general is not to act spontaneously in any application that requires entering personal information. What is meant by personal information includes passwords and all private keys.

I find it absurd that there are those in the crypto community who still fall victim to these operations. Very beginners may find it difficult even if they believe the content.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!