Beware of This Altcoin Project: Phishing Attacks May Increase!

Celsius Network, one of the problematic altcoin projects of recent times, has come to the fore again. He announced that Customer.io had recorded the breach of customer email addresses and relayed it to a third party. Here are the details…

Leaking email addresses of altcoin CEL’s investors

Celsians Network, the unofficial community of Celsius owners, shed light on the data breach in which customer email addresses were transferred to a third party. Celsians Network does not consider the breach to be a significant breach. However, Celsius users are likely to become new targets of phishing attacks. Celsius Network, a crypto lending company, announced that vendor Customer.io has been notified of a data breach. A Customer.io employee accessed a list of Celsius customer email addresses maintained on their platform. Then he passed them on to a third party.

Celsians Network believes that the incident does not pose any high risk to customers. However, the data breach makes Celsius users more likely to be the target of phishing attacks. Phishing is a form of attack that targets users through emails, leading them to reveal personal data and install potentially malware to steal crypto by clicking links that lead to malicious websites.

The crypto ecosystem has witnessed an increase in such attacks since the beginning of 2022. cryptocoin.com As we have also reported, MetaMask and OpenSea users have been targeted in such attacks. The attacks were reported by websites like DeFiPrime. He saw the attacks manifest as malicious pop-ups.

Celsius doesn’t care much

Celsius Network didn’t care about the data breach. He said it didn’t pose a high risk. But being aware of an email address leak to a third party may require more than “awareness”. An employee at Customer.io intentionally and maliciously collected their email address. He then used his access to hand over to a third party. Celsius and the vendor were unable to disclose critical information such as the number of leaked emails, contacting affected users, or details of the platform that no longer has access to client email addresses. Phishing is considered one of the most effective forms of cybercrime. However, there are a few steps to follow to avoid falling into the trap of such an attack. Users can browse the following items:

  • Urgent messages, threats, unknown senders need attention. You may be suspicious of posts that rush you to click, search, or open a link. A false sense of urgency is associated with phishing attacks and scams.
  • Emails that claim to be from a well-known company or institution you know but are sent from a different email domain are often scams. Subtle typos are common in phishing attacks.
  • You may suspect that an email message is a “scam” from a sender you don’t know. In this case, it is better not to click on the links.
We Lost Hundreds of Millions With This Altcoin

Celsius token not affected by data leak

Meanwhile, the Celsius (CEL) token has soared 15 percent overnight, and nearly 80 percent over the past two weeks. The price increase of the CEL token was not affected by the data breach event. Forbes compared the hashtag #celshortsqueeze to the 2021 GameStop campaign. To protect themselves from the bears, some users have gathered under the Twitter hashtag #celshortsqueeze to make it harder for traders who short CEL.

Contact us to be instantly informed about the last minute developments. twitterin, Facebookin and InstagramFollow and Telegram and YouTube join our channel!

Disclaimer: The articles and articles on Kriptokoin.com do not constitute investment advice. Cryptokoin.com does not recommend buying or selling any cryptocurrencies or digital assets, nor is Kriptokoin.com an investment advisor. For this reason, Kriptokoin.com and the authors of the articles on the site cannot be held responsible for your investment decisions. Readers should do their own research before taking any action regarding the company, assets or services in this article.

Warning: Citing the news content of Kriptokoin.com and quoting by giving a link is subject to the permission of Kriptokoin.com. No content on the site can be copied, reproduced or published on any platform without permission. Legal action will be taken against those who use the code, design, text, graphics and all other content of Kriptokoin.com in violation of intellectual property law and relevant legislation.


source site-2