Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Users who visit the Caintlegraph website on Sunday were confronted with a misleading pop -up window and claimed to have received rewards for a token.
The pop -up report seemed to be part of the legitimate promotion of Caintelegraph and told visitors that they were randomly selected to receive 50,000 “CTG” tokens worth more than $ 5,000.
The offer seemed polished and convincing and represented elements of the brand and interface of the company that imitated the real AirDrop campaigns.
It included a countdown timer and a challenge to connect crypto wallets, standard elements in the right effort to distribute tokens. However, the whole experience was made by attackers.
A similar front-end Attack appeared on Coinmarketcap over the weekend.
Scam Sniffer, a security company Blockchain, described violations and published public warnings, warned that Caintelegraph’s frontnd was endangered.
“Be careful,” the company tweeted with the screenshots of the injecting code and the false AirDrop interface. The fraud was probably designed to make the user a permission for the wallet, which eventually allowed hackers to release all means.
Caintelegraph later confirmed violations and issued a warning. The company urged users not to interact with the fraudulent pop -up window and emphasized that it had never released the “CTG” token or launched the initial offer of coins. He also assured the reader that the repair was going.
According to Scam Sniffer, the malicious code of JavaScript came from the advertising system of the site rather than the basic infrastructure.
The file, given through the advertising partner of Cointlegraph, contained the scripts discharge of the wallet masked as the standard delivery code of advertising. This technique has become more common in recent months because attackers seek to use vulnerability in third -party systems of trusted platforms.
The fraud interface has shown a false reward worth $ 5,490 and identified the transaction process as “safe”, “immediate” and “proven”. Once the users clicked to connect their wallet, the script launched a feature that could start approval and transfers without informed user consent.
These types of attacks are particularly dangerous because they appear on familiar trusted websites. Many users assume that such platforms have sufficient security measures and can guard their guard. As a result, the exploitation based on ads are much more efficient than phishing links sent via e-mail or social media.
The CTG token listed in fraud does not exist on Coinmarketcap, Coingecko or any legitimate exchange. There is no record on Ethereum or other main blockchains. These red flags may be obvious to veterans users, but newer space participants often do not know what to look for in the legitimate offer of the token.
A similar violation was recorded in the crypto space. CoinMarketcap also experienced a comparable incident This month, when the attackers put a link to discharge the wallet into the front promo box on the web. In this case, the compromise also stems from a third -party code, not from the basic platform.
Since more crypto companies depend on external advertising services, their surfaces for the attack increase dramatically. Although the platform is secured at the application level, harmful scripts supplied through external partners can easily bypass protection. The growing trend has provoked challenges to stricter third -party integration and more robust quarantine of external content.
Contribution Caintelegraph suffers from a similar cyber attack after Coinmarketcap – What’s the matter? He appeared for the first time Cryptonews.