Have you ever lost your wallet? Even if you just think you have, your heart immediately begins to race, and you’re driven to act as quickly as possible to recover what is yours…before it’s too late. In this latest phishing scheme, hackers are capitalizing on the universal panic they know sets in, whether your wallet is Vuitton or virtual.
If you’re new to cryptocurrency, there are a few things you should know.
COINBASE: Coinbase is a <relatively> secure online platform for buying, selling, transferring, and storing cryptocurrency.
PRIVATE KEYS: Account holders have their own personal Coinbase Wallet where passwords, known as private keys, are stored. These private keys prove your ownership of your digital money and allow you to make transactions. Without your private keys, you lose access to your cryptocurrency.
RECOVERY OR SEED PHRASE: When your Coinbase Wallet is first set up a recovery phrase is automatically generated. The recovery phrase (also called seed phrase) is a string of 12 to 24 simple words that will unlock your wallet, along with the private keys associated with the cryptocurrency in your wallet.
With more than 108 million customers, Coinbase was a great option for an elaborate multi-step phishing attack that leveraged a reputable web development platform to harvest credentials in order to gain control of the victims’ cryptocurrency. To lure victims in, bad actors sent a Coinbase branded phishing email that informed readers of the company’s newly upgraded account verification process. To continue using Coinbase and keep their wallet from being suspended, users needed to verify their account information.
After clicking on the “Go to verification” button within the email, victims were taken to phishing site hosted on fleek[.]co, which is a highly reputable web development platform that offers free personal accounts with no credit card required (characteristics that phishers appreciate).
The fake Coinbase page informs customers that they will need to enter their 12-word “Secret Phrase” (wrong term, which we’ll cover later) to verify their account and stop the scheduled deactivation. This is the main goal – capturing the very credential that controls access to all of the victim’s cryptocurrency. The cybercriminals even go so far as to share the exact date and time of the impending account deactivation.
Finally, victims are guided to the page where they would enter their recovery phrase. For anyone who did give up their recovery phrase, it was “game over”. Even the Coinbase website provides a warning that references someone who lost hundreds of millions of dollars in bitcoin as a result of losing their recovery phrase.
Professional corporations are known to employ teams of talented writers and editors. They have style guides to help ensure communications are always on brand, and their processes make certain that before an email gets to a customer, numerous people have proofed and approved it. Especially in cases like account suspension, the communication must be precise and clear.
We have to hand it to this group of phishers, they did a nice job with the language in this threat. And because it lacked the types of obvious grammatical errors we have come to expect from phishing emails, other clues could more easily be overlooked. Still, if you zero in or do a little investigating on the Coinbase website, you might uncover some red flags. Our hope is that sharing these details will help you gain a better eye for catching them.
Let’s summarize some of the tactics used in this Coinbase cryptocurrency credential harvesting phishing attack.
Money is powerful. Getting money obviously pushes people into a life of crime. Losing money – or at least the threat of it - can quickly lead us into making snap decisions. Hopefully this INKY Fresh Phish will instill a new rule of thumb; If an email combines urgency and money, it’s worth your while to take a deep breath and pause.
To really catch phish two things are required. First, you must do your own part to recognize the signs of a phishing email and make intelligent choices for your own safety and for the safety of your organization. Secondly, realize that you can’t do it all on your own and ensure you have an expert at your side.
INKY is the behavioral email security platform that blocks threats, prevents data leaks, and coaches users to make smart decisions regarding the safety of their email. Like a cybersecurity coach, it signals suspicious behaviors with interactive banners that guide users to take safe action on any device or email client. IT teams don’t face the burden of filtering every email themselves or maintaining multiple systems. Through powerful technology and intuitive user engagement, INKY keeps bad actors out for good. Start a free trial or schedule a demo.
INKY is an award-winning, behavioral email security platform that blocks phishing threats, prevents data leaks, and coaches users to make smart decisions. Like a cybersecurity coach, INKY signals suspicious behaviors with interactive email banners that guide users to take safe action on any device or email client. IT teams don’t face the burden of filtering every email themselves or maintaining multiple systems. Through powerful technology and intuitive user engagement, INKY keeps phishers out for good. Learn why so many companies trust the security of their email to INKY. Request an online demonstration today.