Phishing Attacks

By xuanling11 | Crypto Learning | 1 Feb 2022

What is Phishing?

It is a common cyber-attack of sending fraudulent communications that appear to come from a reputable source.


Purpose of Phishing?

Hackers try to get personal data or sensitive information to fully gain control of your personal accounts or business entities' accounts. The worst hackers can do is steal data for sale or possibly ask for ransom fees.


How Phishing Works?

  1. Hackers identify target audiences or groups
  2. Counterfeit communications appear from a trustworthy source
  3. Frequently use emotions like fear, curiosity, urgency, or greeting to offer helps and ask to share sensitive information or open attachments or click links


Types of Phishing


Spear phishing: target specific individuals to gain account access fully to a wide group of people or entities later

Business Email Compromise (BEC): sent fraudulent emails to ask for click on links or attachments

Whaling: pretending to be CEO or a big fish to ask you a favor to access login access

Social Media Phish: attack social media users with fraudulent helps support offering

Voice Phishing: calling to present support to obtain sensitive information


Common Crypto Phishing (Discord)


Winning Crypto: you will receive a message of winning a huge lottery and ask to either click a link to claim your winnings or go to the website to submit your account information


Claim Reward: a legitimate like direct message asking you to claim your reward from nowhere and click a link


Customer Supports: a legitimate like direct message offers support and ask you to fill out a Google document or go to the website to connect your wallet


Fake Bots: a common use bot that asks to verify your account and connect with your wallet


What To Do (Discord)

  1. Think twice: do not click anything from a direct message
  2. Check users’ names: check their profile, mutual servers shared, and mutual friends
  3. Ask around before clicking: screenshot the conversation and share in the forum with others to verify 
  4. Search server with user names: research user name with shared server to see such user actually had any conversation in channels
  5. Submit and report: click spam and block users


This article is also published in Cryptologist as parnership publication.

Photo by stephen momot on Unsplash
Note: the post was shared on multiple platforms here.

You can refer my previous article lists here
Digital Commodities- the Unlimited Resources of Commodities Has Born
Universal Income in Crypto Way
DeFi 1.0 is Officially Dead - Welcome to DeFi 2.0
NFT Has a New Purpose
How Many Ads Are Too Much - Floki Inu Ads Got Backfire
Metaverse - Second Life Era
Bitcoin ATM Adoption and Its Potential Security Vulnerabilities
When Corporations Are Running By Everyone
The Fundamental Value Is Irrelevant
Coinbase At Huge Reputation Crisis
CBDCs' Flaw Design
Regulations Start Hitting Crypto Exchanges
From Bitcoin Standard To Zero-Knowledge Proofs - Decentralization 2.0
Shiba Hits 1 Million Users (Army) Milestone: What is Next?
How To Avoid Crypto Scammers
Crypto Philanthropy
Shiba Game - When Meme Meets Metaverse
Twitter CEO Steps Down - A Full-Time Bitcoiner
Change of Macroeconomy Landscape
CBDC Is Losing The Game
Crypto AWS
Doge The Future
El Salvador's Bitcoin
Market Sentiment Has Changed
Brief History of Ethereum and How Ethereum 2.0 May Over Promise
Crypto Is Getting Real
Who Cares If Craig Wright Is The Real Satoshi
Institutional Investors vs. Whales
What Happened In BadgerDao
A Proposal To Move Bitcoin Mining PoW Away
IMF Keep Crying Out, Crypto Adoption Keep Accelerating
Dogecoin Is Back to Top 10 But The Moon Shot Is Looming
How to Avoid The New Wallet Scam
Defi Enters To Crypto Bond Phase
What Types of Metaverse You Want
Global Regulations Are Coming Or Can They
IMF Did Have A Plan to Run Global Regulations
Doge Starts Moving
A New Malware Will Steal From Telegram
Smart Money Is Out, Institutional Money Is In
Wait, Web3 or Web 3.0 or web3
Airdrop?! Not So Lucky Anymore!
2022 Prediction #1: L1 Scalability
2022 Prediction #2: L2 Bridges
2022 Prediction #3: Zero-Knowledge Proofs or ZKPs
2022 Prediction #4: Regulated Defi On-Chain KYC
2022 Prediction #5: Institutional Crypto Adoption
2022 Prediction #6: Defi Insurance
2022 Prediction #7: NFTs-Based Communities - DAO 1.5
2022 Prediction #8: Metaverse and NFTs
2022 Prediction #9: Web2 Companies’ FOMO
2022 Prediction #10: Time for DAO 2.0
Craig vs People
Polygon Enters ZKPs - Plonky2 Backfire - When Centralized Crypto Service Panic
Coinbase NFT Marketplace
Crypto Paycheck
Coinbase Customer Service Alive
When Meta Patented Metaverse
When You Want Someone Forget About What You Did, Just Change You Name
When YouTube Enters Into NFTs
Facebook Just Did the Rug Pull
Bridging Between Web2 to Web3 Through NFTs
DAO The Way Part 1
DAO The Way Part 2
Who Is The Winner of The Crypto Adoption
Disclosure: The article was written by a delusional author who is possibly a nut job without any questions whatsoever about expertise in the subject matters. You should not believe any words this author wrote or you may experience similar symptoms or even possibly become a nut job.

How do you rate this article?



Check out

Crypto Learning
Crypto Learning

All article was written by a delusional author who is possibly a nut job without any questions whatsoever about expertise in the subject matters.

Send a $0.01 microtip in crypto to the author, and earn yourself as you read!

20% to author / 80% to me.
We pay the tips from our rewards pool.