2020
DOI: 10.1007/978-3-030-50506-6_45
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…The social engineering attack (SEA) is defined as an action, where “an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems” [ 184 ]. Social engineering is targeting Internet-related systems in particular, and is increasingly being applied to cryptocurrency users [ 185 ].…”
Section: Social Engineering Attacks and Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…The social engineering attack (SEA) is defined as an action, where “an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems” [ 184 ]. Social engineering is targeting Internet-related systems in particular, and is increasingly being applied to cryptocurrency users [ 185 ].…”
Section: Social Engineering Attacks and Countermeasuresmentioning
confidence: 99%
“…Social engineering attacks on cryptocurrency users exploit the human factor [ 185 ]. Socially based cyberattacks can appear by employing various acts, such as tailgating, impersonating, eavesdropping, shoulder surfing, dumpster diving, reverse social engineering, and others [ 197 ].…”
Section: Social Engineering Attacks and Countermeasuresmentioning
confidence: 99%
“…4,34,35 Social engineering attacks deal with people's behavior and their emotions, and the attacks may be mitigated by social engineering awareness. 36,37 Weber et al 38 argued that security is not a technological problem but rather a people problem. There is need to raise awareness to the human being as a target and attacker.…”
Section: Theoretical Framework Alignmentmentioning
confidence: 99%
“…In November 2017, cybercriminals used a fake Twitter account (@RedPulseNEO) to lure victims to a phishing website (redpulsetoken.co), promising to offer an airdrop (free tokens) for a limited period. Asking the victim to enter the private key of their NEO wallet to claim the bonus, criminals stole the victim's funds [8]. Next attack was Fake Twitter Accounts, 2018: Twitter is a popular social media platform within the cryptocurrency community where all-important players of blockchain and digital economy have Twitter accounts.…”
Section: Introductionmentioning
confidence: 99%
“…Several followers transferred ETH to the fake addresses. In this attack pretexting was used as a social engineering attack technique [8]. Similarly, next to social engineering attack was Ethereum Classic attack, 2017: In 2017, several people lost thousands of dollars of cryptocurrency after Ethereum Classic website was hacked where the owner of Classic Ether Wallet was impersonated, gained access to the domain registry and then redirected the domains to their servers.…”
Section: Introductionmentioning
confidence: 99%