• Latest
  • All
  • How To
Cryptocurrency

Why Hackers Are Targeting New Cryptocurrency Investors

May 3, 2022
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
DHgate Tablet Cases deals
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025
Former X CEO, Linda Yaccarino

Linda Yaccarino Steps Down as CEO of X After Two Years

July 9, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Official document handover by Bernard Mwonyonyo and Habib Lukaya from Roam.

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

July 9, 2025
Samsung

This Samsung Security Update Could Change How You Use Your Phone

July 9, 2025
tecno ultimate g fold concept

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

July 10, 2025
Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Why Hackers Are Targeting New Cryptocurrency Investors

Samuel K Itotia by Samuel K Itotia
May 3, 2022
in Lists
Reading Time: 3 mins read
248
0
Cryptocurrency

According to a paper from Chainalysis, cryptocurrency-related scams reeled in an estimated $8.6 billion in 2019. Still lacking strong regulation, the crypto industry is growing increasingly rife with opportunistic criminals. Although regulation nor self-policing can ever remove all crime from a geographical area or economic sector, the cryptocurrency world needs it more than ever.

Whether the setting is digital or analog, crime is inevitable. Using digital means, however, criminals can strike victims more discreetly. Cybercriminals also have a wider reach than their in-person counterparts.

Being online-based, cryptocurrency opens the doors to tons of opportunistic criminals. Even those with little technical knowledge can overpower fellow internet users, stealing their information, potentially ravaging their personal finances.

We all know that cryptocurrency has long been linked to crime. Cryptocurrency users need to protect themselves. Even once stronger regulations become commonplace, cryptocurrency users will ultimately be responsible for their security online.

Although they often offer smaller payouts than well-established, sophisticated users, hackers like targeting new cryptocurrency users because they have better success with newbies. Why, exactly, are cybercriminals targeting new users? Also, how are hackers breaking through?

Phishing — A Well-Documented Scamming Tactic That Still Works

Phishing uses social engineering to take advantage of innocent internet users. One phishing scheme involves posing as a popular company, including Netflix or Microsoft, and sending emails to hundreds or thousands of accounts.

These emails warn recipients that their accounts have been compromised. Luckily, however, these purported attempted logins weren’t successful. To regain control of their accounts, the emails ask recipients to follow the included link to login, where they’ll be able to change their passwords, protecting their accounts from further unauthorized login attempts.

Recipients follow the link, ending up on a seemingly legitimate website. They enter their information, unknowingly relinquishing it to cybercriminals. From there, cybercriminals use this login information to take control of victims’ accounts.

While large batches of fake emails might only trick one user, phishing is well worth the effort. Customer lists are cheap to purchase and sending thousands of emails only takes one click. Designing fake websites, emails, and other assets is the most time-consuming part of phishing, which doesn’t take that long.

According to Cisco senior research engineer Jeremiah O’Connor, the Ukraine-based group Coinhoarder is alleged to have stolen $50 million using cryptocurrency-related phishing attacks.

Phishing With Google Ads

As internet users, we’re used to seeing ads online. For most Google search results, the website lists between two and four paid results above the fold. At least one can be found at the bottom of each search engine result page.

Hackers buy ads for phrases like “bitcoin wallet,” directing unsuspecting victims to websites like “blockchien.info,” a spoof of blockchain.info, one of the internet’s leading cryptocurrency exchanges and online wallets.

O’Connor believes this pay-per-click ad strategy works so well because internet users are usually only warned not to click on fishy emails. Most people aren’t weary of advertisements, playing into cybercriminals’ hands.

Hot Wallets Pose Threats to Cryptocurrency Owners

Hot wallets are cryptocurrency wallets that are connected to the internet. Many new crypto owners leave their assets in internet-connected wallets, potentially giving cybercriminals access to their portfolios.

Cybercriminals love to target hot wallets, using malware to slyly collect owners’ private keys, later directing victims’ cryptocurrencies to their own wallets. Ultimately, education and strong operating security is the answer to these schemes. Without fail, countless new users will fail to be diligent, playing right into hackers’ hands.

SendShare146Tweet92
Samuel K Itotia

Samuel K Itotia

IT Project Consultant, Bachelor of Computer Science holder, Microsoft Certified IT Professional. Certified Google Apps Cloud Deployment specialist and Trainer. Passionate on the new trends of Technology. He will always share it with the world.

Related Posts

Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025

Latest

Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Linda Yaccarino Steps Down as CEO of X After Two Years

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

This Samsung Security Update Could Change How You Use Your Phone

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.