London Authorities Disrupt Large-Scale Crypto Fraud Network, Blocking 43 Phishing Sites

The National Fraud Intelligence Bureau (NFIB), a law enforcement unit in the United Kingdom specializing in analyzing and collecting intelligence on fraud and finance-related cybercrime, has blocked 43 web domains associated with fraudulent activities, including those involving crypto.

City of London Police’s acting commissioner, Pete O’Doherty, recently shared that the National Fraud Intelligence Bureau (NFIB) uncovered a fake email claiming to be from, a crypto site. They also identified 42 new web domains like “” and “” Once found, authorities promptly shut down these addresses to prevent potential harm.

The NFIB says, “If you get hit by online crooks, tell us through our official channels and hotline.” The cops tell us they’ve shut down nearly 300,000 bad websites thanks to these reports by Dec 2023. Some scams even pretend you’ve scored a Tupperware set in your email. Stay sharp!

Phishing is still a big problem in the crypto world. On Jan 20, Trezor, the company that makes hardware wallets, recently found a security issue. The breach put the data of 66,000 users at risk. Following this, around 41 users told about getting phishing emails. These emails asked for important info to get into their crypto wallets.

Web3 Companies Targeted In Crypto Phishing

Simultaneously, an extensive phishing initiative inundated the email accounts of numerous cryptocurrency investors. On Jan 23, the crypto community identified a phishing attack orchestrated by fraudsters masquerading as representatives from prominent Web3 companies. The hackers executed an email campaign endorsing counterfeit token airdrops, posing as entities such as WalletConnect, Token Terminal, and others.

The phishing incident was subsequently verified to result from a security breach suffered by the email marketing company MailerLite. On Jan 24, the company disclosed that hackers successfully seized control of Web3 accounts through a social engineering attack. According to MailerLite, a team member, in response to a customer inquiry, clicked on a link that redirected them to a deceptive Google sign-in page.

Unaware, the employee logged in, inadvertently granting the attackers entry to MailerLite’s admin panel. According to blockchain analytics firm Nansen, the primary wallet used by the attackers recorded a minimum of $3.3 million in total inflows following the attack.

Related Reading | Unlocking Crypto Adoption: Arthur Hayes AdAdvocates’ ints’ Over ICOs & Yield Farming

The author’s views are for reference only and shall not constitute any investment advice. Please ensure you fully understand and assess the products and associated risks before purchasing.

Comments (No)

Leave a Reply