<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Phishing Attacks Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/phishing-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/phishing-attacks/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 20 Nov 2025 07:18:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Phishing Attacks Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/phishing-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Is the WLFI Network at Risk? User Wallets Secured</title>
		<link>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/</link>
					<comments>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 10:00:30 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain safety]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[fund security]]></category>
		<category><![CDATA[kyc verification]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<category><![CDATA[seed phrase]]></category>
		<category><![CDATA[smart contracts]]></category>
		<category><![CDATA[user wallets]]></category>
		<category><![CDATA[WLFI]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=57438</guid>

					<description><![CDATA[<p>World Liberty Financial WLFI announced that before the platform’s launch, a small number of user wallets were compromised due to phishing attacks or exposed seed phrases. The platform froze affected wallets and required users to complete identity verification. In addition, WLFI developed new smart contract logic to securely reallocate user funds. Prioritizing User Fund Security</p>
<p>The post <a href="https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/">Is the WLFI Network at Risk? User Wallets Secured</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="265" data-end="610"><a href="https://coinengineer.net/blog/world-liberty-financial-wlfi-rewards/"><strong>World Liberty Financial</strong></a> WLFI announced that before the platform’s launch, a small number of user wallets were compromised due to phishing attacks or exposed seed phrases. The platform froze affected wallets and required users to complete identity verification. In addition, <strong>WLFI</strong> developed new smart contract logic to securely reallocate user funds.</p>
<h2 data-start="617" data-end="653">Prioritizing User Fund Security</h2>
<p data-start="655" data-end="945">WLFI emphasized that the security breaches were not caused by the platform or its smart contracts. Attackers accessed wallets through third-party security failures. In September, impacted wallets were frozen and owners were asked to re-complete <a href="https://x.com/worldlibertyfi/status/1991243561715519933?s=20">KYC</a> verification to confirm their identity.</p>
<p data-start="947" data-end="1168">Throughout the process, protecting user funds remained the top priority. The team tested new smart contract logic to ensure safe reallocation of funds. While the procedure took time, security was prioritized over speed.</p>
<h2 data-start="1175" data-end="1221">New Smart Contracts and Fund Reallocation</h2>
<p data-start="1223" data-end="1548">The new smart contract logic was specifically designed for bulk fund reallocation. Users who complete the required KYC verification will be able to securely access their funds. Wallets of users who have not yet completed the verification process remain frozen, but they can initiate verification through WLFI’s help center.</p>
<p data-start="1550" data-end="1771">By implementing these measures, WLFI ensures both regulatory compliance and maximum protection for user funds. The platform reiterated that the attacks stemmed from external vulnerabilities, not the WLFI network itself.</p>
<h2 data-start="1778" data-end="1814">Important Information for Users</h2>
<ul data-start="1816" data-end="2091">
<li data-start="1816" data-end="1912">
<p data-start="1818" data-end="1912">Affected users will have funds reallocated to new wallets after completing KYC verification.</p>
</li>
<li data-start="1913" data-end="2005">
<p data-start="1915" data-end="2005">Users who have not verified their identity can start the process via the support center.</p>
</li>
<li data-start="2006" data-end="2091">
<p data-start="2008" data-end="2091">The new smart contracts ensure secure bulk fund transfers for all verified users.</p>
</li>
</ul>
<p data-start="2093" data-end="2208">WLFI continues to update users and prioritize platform security while maintaining trust and regulatory standards.</p>
<p data-start="2093" data-end="2208"><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for </em><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/">Is the WLFI Network at Risk? User Wallets Secured</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/wlfi-network-fund-security-user-wallets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/rezerv_ce-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/rezerv_ce-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Fraud Alert: 20M USDT Missing in Scam</title>
		<link>https://coinengineer.net/blog/crypto-fraud-alert-20m-usdt-missing-in-scam/</link>
					<comments>https://coinengineer.net/blog/crypto-fraud-alert-20m-usdt-missing-in-scam/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Mon, 26 May 2025 11:00:04 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[address poisoning]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[digital wallets]]></category>
		<category><![CDATA[Ethereum scams]]></category>
		<category><![CDATA[onchain phishing]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<category><![CDATA[scam prevention]]></category>
		<category><![CDATA[Tether scam]]></category>
		<category><![CDATA[Wallet Safety]]></category>
		<category><![CDATA[zero-value transfer]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43139</guid>

					<description><![CDATA[<p>Crypto Scams: The Threat of Zero-Value Transfer   Crypto scams have been rapidly increasing recently. In particular, the zero-value transfer phishing method is threatening investors. In this method, scammers manipulate users’ wallet histories with zero-value token transfers. Users, mistaking fake addresses for legitimate ones, accidentally send their assets to scammers.   An investor fell victim to two</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-alert-20m-usdt-missing-in-scam/">Crypto Fraud Alert: 20M USDT Missing in Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span data-c>Crypto Scams: The Threat of Zero-Value Transfer </span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>Crypto scams</strong> have been rapidly increasing recently. In particular, the <strong>zero-value transfer phishing</strong> method is threatening investors. In this method, scammers manipulate users’ wallet histories with zero-value token transfers. Users, mistaking fake addresses for legitimate ones, accidentally send their assets to scammers. </span><span data-ccp-props="{}"> </span></p>
<p><span data-c>An investor fell victim to two separate <strong>zero-value transfer scams</strong> within three hours, losing<strong> 843,000 USDT</strong> and 1.75 million USDT. According to Cyvers’ report dated May 26, 2025, this method employs a sophisticated <strong>onchain phishing</strong> tactic. Scammers exploit the token transferFrom function to <strong>add zero-value transactions to wallets</strong>, causing users to copy incorrect addresses. Additionally, between<strong> 2022 and 2024, 270 million address poisoning</strong> attempts were detected on <strong>Ethereum and BNB Chain</strong>. Of these, 6,633 were successful, resulting in losses of 83.8 million dollars. </span><span data-ccp-props="{}"> </span></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr"><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley"  />ALERT<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley"  />Our system has detected~2.6M <a href="https://twitter.com/search?q=%24USDT&amp;src=ctag&amp;ref_src=twsrc%5Etfw">$USDT</a> loss from a targeted address poisoning scam involving zero-value transfers. A single victim was repeatedly scammed by the same attacker address.</p>
<p>First, the victim lost 843K <a href="https://twitter.com/search?q=%24USDT&amp;src=ctag&amp;ref_src=twsrc%5Etfw">$USDT</a>. <br /><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/23f3.png" alt="⏳" class="wp-smiley"  /> About 3 hours later, the same victim sent 1.75M… <a href="https://t.co/WWVlrZvavK">pic.twitter.com/WWVlrZvavK</a></p>
<p>&mdash; <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley"  /> Cyvers Alerts <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f6a8.png" alt="🚨" class="wp-smiley"  /> (@CyversAlerts) <a href="https://twitter.com/CyversAlerts/status/1926915902001254475?ref_src=twsrc%5Etfw">May 26, 2025</a></p></blockquote>
<p></p>
<h2><span data-c>Address Poisoning and Security Measures </span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Address <strong>poisoning is another method frequently</strong> used by scammers. In this technique, <strong>scammers create fake addresses</strong> that closely resemble legitimate wallet addresses. For example, they mimic the first and last characters of an address to deceive users. In one incident, an investor sent 71 million dollars’ worth of <strong>Wrapped <a href="https://coinengineer.net/blog/bitcoin-struggles-to-break-110k-key-data-analysis/">Bitcoin</a></strong> to a fake address, but the scammer returned the funds. However, in similar cases, losses are often unrecoverable. </span></p>
<p><span data-c><strong>According to CertiK’s 2025 report</strong>, phishing attacks in 2024 caused losses exceeding <strong>1 billion</strong> dollars. Users should carefully verify addresses before transactions. Using <strong>hardware wallets, enabling two-factor authentication, and updating software</strong> only from trusted sources enhance security. Additionally, conducting small test transactions can prevent significant losses. </span><span data-ccp-props="{}"> </span></p>
<p><span data-c>For instance, <a href="https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/"><strong>Scam</strong></a> Sniffer reported a <strong>771,000-dollar loss due to address</strong> poisoning in February 2025. Users should regularly check their wallet histories and report suspicious transactions. </span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Crypto Scam: 20 Million USDT Theft </span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>In a notable case, on August 1, 2023, a scammer successfully stole <strong>20 million USDT through a zero-value transfer phishing</strong> attack. According to PeckShield’s report, the victim (wallet address: 0x4071…9Cbc) intended to send funds to 0xa7B4BAC8f0f9692e56750aEFB5f6cB5516E90570. However, the scammer used a similar fake address (0xa7Bf48749D2E4aA29e3209879956b9bAa9E90570) to deceive the investor. After the investor sent <strong>10 million USDT from Binance to another address</strong>, the scammer intervened, manipulating the transaction history with a <strong>fake zero USDT</strong> transfer. As a result, the victim sent 20 million USDT to the scammer’s address.</span></p>
<p><span data-c> Tether blacklisted the <strong>fake address approximately</strong> one hour after detecting the scam. This swift response drew attention in the crypto community. <strong>ZachXBT questioned Tether’s speed</strong>, suggesting that a “serious player” might be behind the incident. This event highlights that zero-value transfer scams caused over 40 million dollars in losses in 2023. </span><span data-ccp-props="{}"> </span></p>
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-alert-20m-usdt-missing-in-scam/">Crypto Fraud Alert: 20M USDT Missing in Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-fraud-alert-20m-usdt-missing-in-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-26T123810.945.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-26T123810.945.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Binance CZ Urgent Crypto Security Warning</title>
		<link>https://coinengineer.net/blog/binance-cz-warning-phishing-attacks-crypto-security/</link>
					<comments>https://coinengineer.net/blog/binance-cz-warning-phishing-attacks-crypto-security/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Sat, 17 May 2025 10:00:10 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[Changpeng Zhao]]></category>
		<category><![CDATA[coinbase]]></category>
		<category><![CDATA[Crypto Safety]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Cryptocurrency Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[CZ]]></category>
		<category><![CDATA[Hardware Security Keys]]></category>
		<category><![CDATA[IP Whitelisting]]></category>
		<category><![CDATA[Password Managers]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<category><![CDATA[Two Factor Authentication]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42570</guid>

					<description><![CDATA[<p>Binance (CZ) Issues Serious Warning to Crypto Users  Changpeng Zhao (CZ), the founder of Binance, issued a serious warning to crypto users in a post on the social media platform X. He highlighted an increase in phishing attacks and urged users to take immediate precautions against these threats.  Scammers often impersonate fake support representatives to</p>
<p>The post <a href="https://coinengineer.net/blog/binance-cz-warning-phishing-attacks-crypto-security/">Binance CZ Urgent Crypto Security Warning</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span data-c>Binance (CZ) Issues Serious Warning to Crypto Users</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>Changpeng Zhao (CZ)</strong>, the founder of<strong> Binance</strong>, issued a serious warning to crypto users in a post on the social media platform X. He highlighted an increase in <strong>phishing attacks</strong> and urged users to take immediate precautions against these threats.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>Scammers</strong> often impersonate fake support representatives to steal user information. CZ emphasized that passwords should never be shared with anyone. Genuine support teams never ask for passwords. He also advised <strong>against clicking on links</strong> received via email. Users are recommended to type the <strong>URL</strong> directly into the browser to access sites. This method can prevent most phishing attacks.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Password Security and Password Managers</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>Binance&#8217;s CZ</strong> stated that the same password should not be used across different platforms. Each site should have unique and strong passwords. Password managers offer extra protection by recognizing fake domain names. These small but crucial steps can prevent significant losses. CZ said, <strong>“Use unique passwords for each platform. Password managers make this process easier.”</strong></span><strong> </strong></p>
<h2><span data-c>Two-Factor Authentication and Hardware Keys</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>CZ recommended hardware-based <strong>2FA</strong> to enhance security. Physical security keys like Yubikey significantly reduce phishing attacks. These keys verify that the person logging in is really you. Research by <strong>Binance on users in Asia</strong> supports CZ’s words. According to data, 80% of users use two-factor authentication. However, the use of advanced security tools remains low.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>For example, only 21.5% use phishing prevention codes, and just 17.6% use <strong>IP whitelisting</strong> features. These figures indicate the need for users to develop more conscious security habits.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Coinbase Incident and Increasing Threats</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Last week’s <a href="https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/">Coinbase</a> incident revealed the seriousness of the threats. Some overseas support staff accepted bribes to gain access to customer information. This showed that not only technical but also human vulnerabilities pose significant risks. The <strong><a href="https://coinengineer.net/blog/14-month-prison-sentence-for-bitcoin-etf-tweet/">crypto</a></strong> ecosystem is becoming increasingly complex day by day. The type and frequency of <strong>cyberattacks</strong> are rising. Therefore, users must not remain passive. It is important to remember that security is not only the responsibility of companies.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/binance-cz-warning-phishing-attacks-crypto-security/">Binance CZ Urgent Crypto Security Warning</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/binance-cz-warning-phishing-attacks-crypto-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T122918.667.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T122918.667.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
