London Authorities Shut Down 43 Crypto Phishing Websites in Operation

Share IT

Key takeaways:

  • The NFIB, a UK police unit entrusted with researching, reviewing, and gathering intelligence on fraud, has blocked 43 web domains linked to fraudulent operations. 
  • In order to report cybercrimes, victims should use the NFIB’s official channels and hotline, according to the organization.

The National Fraud Intelligence Bureau (NFIB), a UK police unit entrusted with researching, reviewing, and gathering intelligence on fraud and finance-related cybercrimes, has blocked 43 web domains linked to fraudulent operations.

A fake email address claiming to be from the cryptocurrency website blockchain.com was found by the NFIB, according to a report from Pete O’Doherty, the interim commissioner of the City of London Police.ย 

Forty-two other web names, including “actionfraud.info” and “department-fraud.com,” were discovered by the authorities. 

Once the addresses were found, the authorities immediately blocked them. In order to report cybercrimes, victims should use the NFIB’s official channels and hotline, according to the organization.

According to the police unit, as a result of the reports, it had eliminated about 300,000 dangerous websites by December 2023. Claiming that the email recipient won a Tupperware set is one example of a phishing effort.

Phishing is still a significant problem in the cryptocurrency world. Trezor, a producer of hardware wallets, announced on January 20 that 66,000 customers’ data had been exposed due to a security vulnerability. 

Following the event, at least 41 individuals claimed to have received phishing emails asking for private information to gain access to their cryptocurrency wallets.

In the meantime, numerous cryptocurrency investors’ email addresses were inundated with phishing attempts. The crypto community discovered a phishing attempt on January 23 that was carried out by con artists posing as representatives of well-known Web3 companies.

Hackers posing as representatives of firms like WalletConnect, Token Terminal, and others put out an email campaign advertising fictitious token airdrops.

Later, it was established that the security vulnerability of the email marketing company MailerLite was the reason behind the phishing attempt. 

The company disclosed on January 24 that, through a social engineering attack, hackers could take control of Web3 accounts. A team member answering a customer’s question allegedly clicked on a link that brought them to a phony Google sign-in page, according to MailerLite.

Unknowingly providing the attackers access to MailerLite’s admin panel, the employee signed in. According to blockchain analytics company Nansen, at least $3.3 million has been added to the attackers’ primary wallet since the attack.

Share IT
Deep
Deep

Can’t find what you’re looking for? Type below and hit enter!