Customers of Cryptocurrency FTX are Target of Phishing Emails
Customers of the bankrupt cryptocurrency exchange FTX are already receiving phishing emails following a breach of personal data held by several crypto companies, CoinDesk reports.
The customer data was leaked after a T-Mobile employee fell for a SIM swapping attack and granted a threat actor access to an account belonging to an employee of financial advisory firm Kroll. Kroll served as the claims agent in the bankruptcies of FTX, Genesis, and BlockFI, so the attacker was able to steal the data from Kroll.
“Customer data of other bankrupt crypto firms Genesis and lender BlockFi were also leaked in that attack,” CoinDesk notes. “Crypto account passwords and other sensitive data weren’t affected, but customers were warned to be on the lookout for scammers impersonating parties in the bankruptcy. Whoever got their hands on this goldmine of information lost no time in crafting hopeful emails that purport to return the lost capital to holders – as long as they first connect a crypto wallet to the account.”
The phishing emails state, “You have been identified as an eligible client to begin withdrawing digital assets from your FTX account. Withdrawals will be dispatched in USDC matched to the balance of digital assets held in your wallet at the time of platform pause. You can now withdraw to an external ERC20 wallet by clicking the withdraw now button.”
CoinDesk explains, “SIM swapping happens when scammers contact your mobile phone’s carrier and trick them into activating a SIM card that the fraudsters have. The scammers then target phone numbers and use a victim’s information to steal passwords, financial data, cryptocurrencies, and other valuable items.”
New-school security awareness training can give your employees a healthy sense of suspicion so they can avoid falling for targeted social engineering attacks.
CoinDesk has the story.
Free Phishing Security Test
Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.
Here’s how it works:
- Immediately start your test for up to 100 users (no need to talk to anyone)
- Select from 20+ languages and customize the phishing test template based on your environment
- Choose the landing page your users see after they click
- Show users which red flags they missed, or a 404 page
- Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
- See how your organization compares to others in your industry
PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/phishing-security-test-partner?partnerid=001a000001lWEoJAAW