🎉 #Gate Alpha 3rd Points Carnival & ES Launchpool# Joint Promotion Task is Now Live!
Total Prize Pool: 1,250 $ES
This campaign aims to promote the Eclipse ($ES) Launchpool and Alpha Phase 11: $ES Special Event.
📄 For details, please refer to:
Launchpool Announcement: https://www.gate.com/zh/announcements/article/46134
Alpha Phase 11 Announcement: https://www.gate.com/zh/announcements/article/46137
🧩 [Task Details]
Create content around the Launchpool and Alpha Phase 11 campaign and include a screenshot of your participation.
📸 [How to Participate]
1️⃣ Post with the hashtag #Gate Alpha 3rd
Social engineering scams have become the biggest threat to encryption assets, and platform users need to be alert to new types of attack methods.
Social engineering attacks have become a major threat to encryption asset users
In recent years, social engineering attacks targeting cryptocurrency users have shown an upward trend, attracting widespread attention in the industry. These attacks not only have characteristics of persistence and organization but also result in huge financial losses.
On May 15, a trading platform announced that it had confirmed an internal data leak incident and stated that the U.S. Department of Justice has intervened in the investigation. This once again highlights the serious threat that social engineering scams pose to the security of user assets.
Analysis of Fraud Techniques
Fraudsters typically carry out attacks through the following steps:
Impersonate official customer service to contact users, claiming that there is an abnormal situation with their account.
Inducing users to install specific wallet applications and transfer assets.
Provide fake mnemonic phrases, claiming to be the "official new wallet".
Once the user transfers funds to the new wallet, the scammers immediately withdraw the assets.
Some scammers also use false "class action" news to create a sense of urgency to prompt users to take action.
Characteristics of Scam Organizations
These attacks are usually carried out by organized gangs and have the following characteristics:
Capital Flow Analysis
On-chain data shows that scammers mainly target mainstream assets such as BTC and ETH, with single profits reaching millions of dollars. They typically quickly convert the proceeds into stablecoins and transfer assets through various means to evade tracking.
Coping Suggestions
On the platform side:
User aspect:
Conclusion
This incident has once again exposed the industry's shortcomings in customer data protection and asset security. The platform needs to comprehensively enhance the security level of internal personnel management and outsourced services, incorporating social engineering defense into the overall security strategy. Moreover, once systemic threats are detected, the platform should respond promptly and take measures to maintain user trust and asset security.