The 2 Most Common Airdrop Phishing Attacks and How Web3 Wallet Owners Can Stay Protected – Featured Bitcoin News

In the world of cryptocurrencies, decentralized finance (defi), and Web3, airdrops have become commonplace in the industry. However, while airdrops sound like free money, there’s been a growing trend of airdrop phishing scams that steal people’s money when they attempt to get the so-called ‘free’ crypto assets. The following is a look at two different ways attackers use airdrop phishing scams to steal funds and how you can protect yourself.

Airdrops Don’t Always Mean ‘Free Crypto’ — Many Airdrop Giveaway Promotions Are Looking to Rob You

Airdrops have been synonymous with free crypto funds, so much so that a rising crypto scam called airdrop phishing has become prevalent. If you are a participant in the crypto community and use social media platforms like Twitter or Facebook, you’ve probably seen a number of spam posts advertising airdrops of all kinds.

Usually, a popular Twitter crypto account makes a tweet and it is followed by a slew of scammers advertising airdrop phishing attempts and plenty of accounts saying that they have received free money. Most people won’t fall for these airdrop scams but because airdrops are considered free crypto, there’s been a bunch of people who have lost funds by falling victim to these types of attacks.

The first attack uses the same advertising method on social media, as a number of people or bots shill a link that leads to the airdrop phishing scams web page. The suspicious website may look very legitimate and even copy some of the elements from popular Web3 projects, but in the end, the scammers are looking to steal funds. The free airdrop scam could be an unknown crypto token, or it could also be a popular existing digital asset like BTC, ETH, SHIB, DOGE, and more.

The first attack usually shows that the airdrop is receivable but the person must use a compatible Web3 wallet to retrieve the so-called ‘free’ funds. The website will lead to a page that shows all the popular Web3 wallets like Metamask and others, but this time, when clicking on the wallet’s link an error will pop up and the site will ask the user for the seed phrase.

This is where things get shady because a Web3 wallet will never ask for the seed or 12-24 mnemonic phrase unless the user is actively restoring a wallet. However, unsuspecting airdrop phishing scam users may think the error is legitimate and enter their seed into the web page which eventually leads to the loss of all the funds stored in the wallet.

Basically, the user just gave the private keys to the attackers by falling for the Web3 wallet error page asking for a mnemonic phrase. A person should never enter their seed or 12-24 mnemonic phrase if prompted by an unknown source, and unless there’s a need to restore a wallet, there’s really never a need to enter a seed phrase online.

Giving a Shady Dapp Permissions Is Not the Best Idea

The second attack is a bit more tricky, and the attacker uses the technicalities of code to rob the Web3 wallet user. Similarly, the airdrop phishing scam will be advertised on social media but this time when the person visits the web portal, they can use their Web3 wallet to “connect” to the site.

However, the attacker has written the code in a way that makes it so that instead of giving the site read access to balances, the user is ultimately giving the site full permission to steal the funds in the Web3 wallet. This can happen by simply connecting a Web3 wallet to a scam site and giving it permissions. The attack can be avoided by simply not connecting to the site and walking away, but there are lots of people who have fallen for this phishing attack.

Another way to secure a wallet is by making sure the wallet’s Web3 permissions are connected to sites the user trusts. If there are any decentralized applications (dapps) that seem shady, users should remove permissions if they accidentally connected to the dapp by falling for the ‘free’ crypto scam. However, usually, it is too late, and once the dapp has permission to access the wallet’s funds, the crypto is stolen from the user via the malicious coding applied to the dapp.

The best way to protect yourself from the two attacks mentioned above is to never enter your seed phrase online unless you are purposely restoring a wallet. Alongside this, it is also good form to never connect or give Web3 wallet permissions to shady Web3 websites and dapps you are unfamiliar with using. These two attacks can cause major losses to unsuspecting investors if they are not careful of the current airdrop phishing trend.

Tags in this story
2 common attacks, 2 major attacks, Airdrop, airdrop phishing, airdrop scam, attackers, connecting wallets, decentralized finance, DeFi, Hackers, malicious code, metamask, mnemonic phrase, permissions, Phishing, restoring a wallet, scammers, Scams, Seed Phrase, Wallet Connect, Wallets, Web3, Web3 wallet, Web3 Wallet Attacks

Do you know anyone who has fallen victim to this type of phishing scam? How do you spot crypto phishing attempts? Let us know your thoughts in the comments.

Jamie Redman

Jamie Redman is the News Lead at Bitcoin.com News and a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open-source code, and decentralized applications. Since September 2015, Redman has written more than 5,000 articles for Bitcoin.com News about the disruptive protocols emerging today.




Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.



Source