超过 765K 的 NFT 在 GutterCatGang 的 SIM 交换攻击后被盗
(Over 765K worth of NFTs stolen after SIM swap attack on GutterCatGang)
Published: 2023-07-08
1. 对 Guttercatgang 进行 SIM 交换攻击后 NFT 被盗 - 在最近的一起事件中,在对 Guttercatgang 项目的 SIM 交换攻击后,价值超过 765k 美元的不可替代代币 (NFT) 被盗. - 攻击涉及黑客通过诱骗电信公司将该号码转移到新的SIM卡来访问与受害者的加密钱包帐户关联的电话号码. - 一旦他们控制了受害者的电话号码,攻击者就会重置受害者的密码并将有价值的 NFT 转移到他们自己的钱包中.
2. SIM卡交换攻击正在上升 - SIM卡交换攻击在加密领域变得越来越普遍,因为它们为黑客提供了一种未经授权访问用户帐户的方法. - 这些攻击利用电信系统中的漏洞,允许黑客将受害者的电话号码转移到他们控制的新SIM卡上. - 一旦控制了受害者的电话号码,黑客就可以绕过双因素身份验证(2FA)措施并访问各种在线帐户,包括加密钱包.
3. 防止SIM卡交换攻击的措施 - 为了防止SIM卡交换攻击,建议加密用户启用额外的安全措施,例如使用硬件钱包和身份验证器应用程序,而不是仅依赖基于短信的2FA. - 谨慎在线共享个人信息并避免使用容易猜到的安全问题或密码至关重要. - 此外,用户应经常监控其移动网络连接,并在怀疑有任何异常活动或服务丢失时立即联系其电信提供商。. .
1. NFTs Stolen After SIM Swap Attack on Guttercatgang - In a recent incident,over $765k worth of non-fungible tokens (NFTs) were stolen following a SIM swap attack on the Guttercatgang project. - The attack involved hackers gaining access to the phone number associated with the victim's crypto wallet account by tricking the telecom company into transferring the number to a new SIM card. - Once they gained control of the victim's phone number,the attackers then reset the victim's password and transferred the valuable NFTs to their own wallets.
2. SIM Swap Attacks on the Rise - SIM swap attacks have become increasingly prevalent in the crypto space,as they provide a way for hackers to gain unauthorized access to users' accounts. - These attacks exploit a vulnerability in the telecom system,allowing hackers to transfer a victim's phone number to a new SIM card under their control. - Once in control of the victim's phone number,hackers can bypass two-factor authentication (2FA) measures and gain access to various online accounts,including crypto wallets.
3. Measures to Protect Against SIM Swap Attacks - To protect against SIM swap attacks,crypto users are advised to enable additional security measures,such as using hardware wallets and authenticator apps instead of relying solely on SMS-based 2FA. - It is crucial to be cautious about sharing personal information online and to avoid using easily guessable security questions or passwords. - Furthermore,users should frequently monitor their mobile network connectivity and contact their telecom provider immediately if they suspect any unusual activity or loss of service.
Reference:
cointelegraph.com