The National Fraud Intelligence Bureau (NFIB) London, a law enforcement agency, has blocked 43 domains associated with crypto phishing and fraudulent activities as part of its mission to analyze and collect intelligence on finance-related cybercrime and fraud.
Pete O’Doherty, the temporary commissioner of the City of London Police, reported that the NFIB discovered a sham email address purporting to originate from the cryptocurrency website blockchain.com.
Among the 42 newly registered domains found by the authorities are “actionfraud.info” and “department-fraud.com.” Upon discovering the addresses, the authorities promptly implemented blocking measures.
The NFIB urges those who have been the target of cybercrimes to notify them via their official channels and hotline. As of December 2023, the police unit has removed nearly 300,000 malicious websites in response to the allegations, according to the unit. Claiming that the email’s recipient has won a Tupperware set is one form of phishing attempt.
Phishing remains a pervasive concern among members of the cryptocurrency community. Trezor, a manufacturer of hardware wallets, disclosed a security vulnerability that compromised the information of 66,000 users on January 20.
At least 41 users reported receiving phishing emails requesting sensitive information to access their cryptocurrency purses after the incident.
In the interim, an extensive phishing campaign inundated the email inboxes of numerous cryptocurrency investors. The crypto community discovered a phishing attack on January 23 from fraudsters posing as representatives of crucial Web3 companies.
Under the guise of Cointelegraph, WalletConnect, Token Terminal, and other organizations, hackers distributed an email campaign promoting illegitimate token airdrops.
Email marketing company MailerLite subsequently discovered a compromise that was the root cause of the phishing attack. The organization disclosed on January 24 that an intruder employed social engineering to acquire authority over Web3 accounts.
As per the findings of MailerLite, a team member assisting a customer with an inquiry became victim to a fraudulent Google sign-in page after clicking on a link that redirected them there.
By inadvertently logging in, the employee granted the attackers access to the administration interface of MailerLite. According to blockchain analytics firm Nansen, since the attack, the principal wallet of the assailants has received a minimum of $3.3 million in total inflows.