Wednesday 1 August 2018

Phising is a threat to ICO


People make mistakes trying to get into an ICO because they are quite fascinated with the new technology within the startup world, and so, they do not understand what they are getting themselves into because they rush into it, and they do not realize this until they are stuck. You do not want to find yourself in this situation. Be careful with how you deal with problems and what your policies are. You are the only one responsible for your safety.

An ICO has a number of challenges
Social Media Phishing:
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

Hackers are all over the internet looking for the next innocent to prey on. They use links to fake websites to steal your account or clone sites that look like yours and present it to people to send their address to. Lots of ICOs have been hacked in this form, and they find themselves locked out of their account with another address inserted. I am going to be sharing some first hand experiences with these hackers.

Anti Danilevski, CEO KICKICO,  shared on Medium how his ICO survived these attacks.
Content Delivery Network (CDN) is a system of distributed servers that deliver pages and other web content to a user, based on the geographical locations of the user, the origin of the webpage and the content delivery server.

A Distributed Denial of Service(DDOS) attack is an attempt to make online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites and present a major challenge to making sure people can publish and access important information. Attackers forge IP address, and send requests to a DNS server asking it to send the victim a large reply. The attacker gets the permission to pull request from its botnet amplified and this makes it easier to overwhelm the target.

When you are being DDOSed, connect an intermediate CDN server. You should try to do this before starting your ICO campaign. Most times, they clone your website by registering the same domain name under a different domain zone.


It is always necessary to register all similar domain and watch out for any similar links on Google and Github that might seem like phishing. Always specify the correct website in all of your official social networks.

You can still have a successful ICO without phishing attacks. You need Cloudflare, a two-factor authentication, hard passwords, and only a very few people running the show. Cloudflare provides DDOS mitigation. Cloudflare DDoS protection ensures all internet protection stays online. A two factor authentication is a two step verification that provides an extra layer of security to websites. It requires a password, a username and a piece of information that only the user has on them as a physical token, this makes it harder for potential intruders to gain access and steal your ICOs personal data or identity.


No comments:

Post a Comment