👨💻 The latest technology does not save people from greed. What methods are used by crypto scammers on Twitter and why do they work?
According to a recent study conducted by Privacy Affairs, a cybersecurity and data privacy firm, the value of the cryptocurrency intercepted by attackers in the first 11 months of last year increased by 37% to $4.3 billion. These are global figures, and the largest cases appear in the first places, such as the attack of the Ronin Network Axie Infinity ($615 million) or the hacking of the Wormhole crypto bridge in February ($ 320 million). But the chicken is pecking at the seed, and the overwhelming number of cyber attacks are aimed at private users, owners of not the largest assets. If you are part of the crypto community on Twitter or just post tweets related to cryptocurrencies, be prepared that you will be "hunted". Or perhaps you have already received suspicious messages or emails. Why do these things work?