I guess it's about time to revisit this important subject as the price of bitcoin is picking up and so are those cyber criminals. According to this report,
Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades..
Don't forget about catphishing as well. That's when some dude pretends to be a female to try get their victim to let their guard down and send them bitcoins (because obviously a woman would never scam anyone - they're far too nice for that).
Here is a
classic scandalous example:
Alia's case.
[4]
Domain spoofing - I think this one is very predominant and may have been used by cyber criminals more often. They could impersonate a legit website like this forum, adopting the feel and looks so you need to look closely at the domain name. They could completely hide it using this
puny code technique. MyEtherWallet domain was social engineered using this kind of attack like a year ago if I'm not mistake, which causes millions of dollars lost for crypto enthusiast.
[5]
Evil twin phishing -
"An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate Wi-Fi access point so that an attacker can gather personal or corporate information without the end-user's knowledge." [6]
Juice Jacking - this is where cyber criminals uses public USB port as their attack vector. We can compare this to card skimming scams. Criminals are mirroring the real device so that when you plug-in and try to charge your mobile phone, they can either used it to (1) install malware into your device (2) copy all your data in it.
Source: https://searchsecurity.techtarget.com/definition/evil-twin.
Remember that we always say not to trust public WIFI? However, criminals has found a way to even attack us by disguising as a real and legitimate WIFI access, maybe this is not as well known as other attack vector but this is very scary as well.
It's really hard for us to not to fall for this trick. But at least we should be aware of it and maybe have seconds thoughts before clicking or even giving out our personal data. And for those sites we trusted, a good password manager is a must, or uses 2FA, you can refer to
bitmover's 2FA or
nakamura12's [Guide] How to Enable 2FA using Google Authenticator!.
So be very careful and vigilant !!!.