Posts

Showing posts with the label phishing

Nigeria arrests 800 in major crypto scam raid

A major crypto romance scam operation in Nigeria that targeted North Americans and Europeans has been raided by police, with nearly 800 suspects arrested. Nigeria’s Economic and Financial Crimes Commission (EFCC) said that the seven-story Big Leaf Building in Lagos was stormed on December 10, where 792 suspected fraudsters were arrested. Chinese nationals made up 148 of the arrests, the EFCC said, while 40 were Filipino. Computers, phones, and cars were also seized in the raid. The suspects are believed to have run a major crypto scam in Nigeria that contacted victims through social media. After seduction, they were told of exciting crypto investment opportunities that falsely promised great returns. Austrian crypto scammers blew thousands on clubbing, hookers, shark tank Read more: Football legends Ronaldinho, Luis Figo sued for Omegapro crypto scam promo “Nigerian accomplices were recruited by the foreign kingpins to prospect for victims online t...

OneKey: How Can the Latest Mac Trojan Steal Your Crypto Wallet in 10 Seconds?

Image
It’s commonly said in the crypto world that Apple computers are safer than Windows systems, but nothing is completely secure. Recently, a video posted by SlowMist team member @im23pds sparked heated discussions. In the video, after a Mac installed a DMG package, the hacker’s server obtained various account permissions and wallet private key files from the computer in just ten seconds — completely compromising the system. This article will explain how the attack happened and provide three crucial recommendations you must know. How exactly does the attack happen? 1. Bypassed Apple’s Official Review It’s easy to guess that the attack begins with a typical phishing tactic: tricking the user into thinking they are installing legitimate software, when in fact, it’s a trojan virus. Windows faces similar risks. In most cases, installing software from the Apple Store is safe because Apple has a stringent review process. The system’s access is tightly restricted, minimizing the chance of malicio...