{"id":41538,"date":"2021-09-01T08:02:57","date_gmt":"2021-09-01T12:02:57","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=41538"},"modified":"2021-09-17T07:24:02","modified_gmt":"2021-09-17T11:24:02","slug":"cryptophishing-in-luno","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cryptophishing-in-luno\/41538\/","title":{"rendered":"Cryptophishing on the Luno exchange"},"content":{"rendered":"<p>Since the advent of cryptocurrency, scammers of every stripe have sought to get rich from stealing virtual coins. With cybercriminals duping both <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptoscam-fake-antminer\/39398\/\" target=\"_blank\" rel=\"noopener nofollow\">buyers of mining equipment<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/?s=discord+cryptoscam\" target=\"_blank\" rel=\"noopener nofollow\">cryptoinvestors<\/a>, we spotlight a scam targeting users of the Luno cryptoexchange.<\/p>\n<h2>About Luno<\/h2>\n<p>The Luno cryptocurrency exchange has been in existence since 2013, and today it serves <a href=\"https:\/\/coinmarketcap.com\/exchanges\/luno\/\" target=\"_blank\" rel=\"nofollow noopener\">more than 5 million clients<\/a> in 40 countries. Luno\u2019s primary focus is on emerging markets, allowing users from countries such as Singapore, Malaysia, Indonesia, South Africa, and Nigeria to purchase tokens with local currency.<\/p>\n<p>Luno is a centralized exchange (CEX), meaning clients\u2019 cryptowallet keys are stored on the exchange. Typically, such sites are well protected against hacking and leakage. However, account protection becomes much harder when owners spill their credentials to cybercriminals.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n<h2>A simple phishing scheme<\/h2>\n<p>The attackers who targeted Luno did not reinvent the wheel.\u00a0Rather, they employed the tried-and-true method of playing on people\u2019s desire for free cryptocurrency, sending potential victims e-mail messages, seemingly from the Luno team, saying that an incoming payment has been \u201cplaced on hold due to error(s)\u201d in their profile data. The message includes a link for users to follow and solve the problem.<\/p>\n<div id=\"attachment_41543\" style=\"width: 910px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075601\/cryptophishing-in-luno-screen-1.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-41543\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075601\/cryptophishing-in-luno-screen-1.jpg\" alt=\"Fake incoming transfer notification with link \u2014 just not to Luno\" width=\"900\" height=\"600\" class=\"size-full wp-image-41543\"><\/a><p id=\"caption-attachment-41543\" class=\"wp-caption-text\">Fake incoming transfer notification with link \u2014 just not to Luno<\/p><\/div>\n<p>As per usual with a phishing attack, the scammers forged the sender\u2019s address, making the message look plausible. The strange address of the link lurking under the button, which looks nothing like luno.com and is located in the .ar domain zone (Argentina), might arouse suspicion.<\/p>\n<p>If the victim doesn\u2019t notice this discrepancy and simply clicks, the link takes them through a chain of redirects to an illegitimate Luno login page. The fake resource is very similar in design to the real Luno site, but the cybercriminals did not even try to disguise the URL, apparently counting on user carelessness.<\/p>\n<div id=\"attachment_41544\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075611\/cryptophishing-in-luno-screen-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-41544\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075611\/cryptophishing-in-luno-screen-2.jpg\" alt=\"The fake login page looks like the real one, although with an entirely different URL\" width=\"1460\" height=\"880\" class=\"size-full wp-image-41544\"><\/a><p id=\"caption-attachment-41544\" class=\"wp-caption-text\">The fake login page looks like the real one, although with an entirely different URL<\/p><\/div>\n<p>To keep the cryptoinvestor victim from suspecting anything is amiss, the scammers even set strict security requirements. For example, to log in to the fake site, you need to enter a strong password with the same strict requirements as the official platform.<\/p>\n<div id=\"attachment_41545\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075627\/cryptophishing-in-luno-screen-3.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-41545\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075627\/cryptophishing-in-luno-screen-3.jpg\" alt=\"The password requirements on the fake exchange are as strict as on the real Luno site\" width=\"1460\" height=\"860\" class=\"size-full wp-image-41545\"><\/a><p id=\"caption-attachment-41545\" class=\"wp-caption-text\">The password requirements on the fake exchange are as strict as on the real Luno site<\/p><\/div>\n<p>Next, if the victim enters their credentials and tries to log in, the screen will display a 403 Forbidden error, and that\u2019s it, the attackers now have the password \u2014 and access to the victim\u2019s cryptocurrency.<\/p>\n<div id=\"attachment_41546\" style=\"width: 780px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075642\/cryptophishing-in-luno-screen-4.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-41546\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/09\/01075642\/cryptophishing-in-luno-screen-4.jpg\" alt=\"Error message on the fake exchange\" width=\"770\" height=\"400\" class=\"size-full wp-image-41546\"><\/a><p id=\"caption-attachment-41546\" class=\"wp-caption-text\">Error message on the fake exchange<\/p><\/div>\n<h2>How to guard against cryptophishing<\/h2>\n<p>Phishing remains a viable method of stealing accounts and money on cryptocurrency platforms. That said, knowing a few simple rules will help minimize the risk of getting hooked.<\/p>\n<ul>\n<li>Be vigilant. Unexpected messages about large transfers, gifts, and winnings are nearly always a trick;<\/li>\n<li>Carefully check the URL in the address bar before entering credentials. Website spoofing is a common phishing technique;<\/li>\n<li>Don\u2019t trust links in e-mails. Instead, bookmark the URLs of cryptocurrency wallets, exchanges, and other important services, and open them using your bookmarks;<\/li>\n<li>Use a unique password for each cryptocurrency service (and for all other sites and services as well) so that a hack or data leak on one resource won\u2019t affect your other accounts;<\/li>\n<li>Install a reliable antivirus solution to protect against phishing. For example, <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>\u2018s built-in antiphishing and antifraud modules warn users about potentially dangerous sites in good time.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.<\/p>\n","protected":false},"author":2598,"featured_media":41542,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[374,2640,2713,76,726],"class_list":{"0":"post-41538","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-cryptocurrencies","10":"tag-ethereum","11":"tag-phishing","12":"tag-scam"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptophishing-in-luno\/41538\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptophishing-in-luno\/23236\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptophishing-in-luno\/18723\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cryptophishing-in-luno\/9370\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptophishing-in-luno\/25288\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptophishing-in-luno\/23358\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cryptophishing-in-luno\/22737\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cryptophishing-in-luno\/25903\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cryptophishing-in-luno\/25426\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptophishing-in-luno\/31394\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cryptophishing-in-luno\/9983\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cryptophishing-in-luno\/17551\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cryptophishing-in-luno\/18061\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cryptophishing-in-luno\/15196\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptophishing-in-luno\/27262\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptophishing-in-luno\/31536\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cryptophishing-in-luno\/27476\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptophishing-in-luno\/24286\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptophishing-in-luno\/29610\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptophishing-in-luno\/29415\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/scam\/","name":"scam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=41538"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41538\/revisions"}],"predecessor-version":[{"id":41540,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41538\/revisions\/41540"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41542"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=41538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=41538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}