{"id":47078,"date":"2022-06-10T13:35:06","date_gmt":"2022-06-10T13:35:06","guid":{"rendered":"http:\/\/8c465584-cb7c-4620-af6f-01b267b491c9"},"modified":"2022-06-10T13:35:06","modified_gmt":"2022-06-10T13:35:06","slug":"phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/","title":{"rendered":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto"},"content":{"rendered":"<div size=\"large\" uuid=\"ab835f3f-3ac3-4311-a8d4-bed6fa9f77da\" class=\"c-shortcodeVideo\">\n<div id=\"8954da1f-153d-4275-96ba-3dcd4306b66f\" class=\"c-avVideo o-ratio o-ratio-wide\">\n<div class=\"o-ratio_content\">\n<div class=\"c-videoTitlePanel\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\" data-role=\"imageSource\" class=\"c-videoTitlePanel_image\"> <a class=\"c-videoTitlePanel_play\"><svg class=\"c-videoTitlePanel_play_icon\"><use xlink:href=\"#play\" \/><\/svg><\/a><\/div>\n<p> <!----> <!----> <\/div>\n<\/div>\n<\/div>\n<p>Cyber criminals are sending out millions of phishing emails a day, using extortion and other schemes to steal Bitcoin and other cryptocurrencies from victims.&nbsp;<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">phishing attacks<\/a> use a variety of techniques to trick people into transferring sums of Bitcoin, including phony requests for charity donations and <a href=\"https:\/\/www.zdnet.com\/article\/fbi-email-fraud-keeps-getting-worse-heres-how-to-protect-yourself\/\" rel=\"follow\">business email compromise<\/a> (BEC) scams.&nbsp;<\/p>\n<p>According to a report by <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/how-cyber-criminals-target-cryptocurrency\" target=\"_blank\" rel=\"noopener\">cybersecurity researchers at Proofpoint<\/a>, the company blocks an average of one million extortion emails every day, with some days peaking at nearly two million. Researchers say most of these phishing emails and BEC attacks are asking the victim to make payments in cryptocurrency.&nbsp;<\/p>\n<p>&#8220;Cyber criminal threats to cryptocurrency are not new, however as the general public experiences growing adoption of cryptocurrency, people may be more likely to engage with social engineering lures using such themes,&#8221; said Sherrod DeGrippo, vice president of threat research and detection at Proofpoint.&nbsp;<\/p>\n<p>&#8220;There is no easier method of financial extraction than the illicit transfer of cryptocurrency,&#8221; she added.&nbsp;<\/p>\n<p>One basic attack is to attempt to steal user names and passwords. &#8220;In 2022 Proofpoint has observed regular attempts to compromise user&#8217;s cryptocurrency wallets using credential harvesting. This method often relies on the delivery of a URL within an email body or formatted object which redirects to a credential harvesting landing page,&#8221; the company said.<\/p>\n<p>Another of the most common methods cyber criminals in attempts to steal cryptocurrency in phishing attacks is plain old extortion. The victim receives an email from a &#8216;hacker&#8217; who claims to have gained control of their computer and their online accounts with <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\" rel=\"follow\">malware<\/a>, as well having access to audio and video recordings of the user, alongside their browsing history.&nbsp;<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/\" rel=\"follow\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNet special report)<\/strong><\/strong><\/p>\n<p>The email attempts to blackmail the victim, claiming the &#8216;hacker&#8217; has embarrassing information and video recordings about them, which they&#8217;ll send to all their friends \u2013 unless they pay $500 in Bitcoin. &nbsp;<\/p>\n<p>In reality, it&#8217;s highly unlikely that there&#8217;s any malware on the victim&#8217;s machine: the attacker has just sent out spam emails to as many users as possible. &nbsp;But the <a href=\"https:\/\/www.zdnet.com\/article\/this-strange-new-phishing-attack-uses-a-surprise-bill-to-trick-you-into-clicking\/\" rel=\"follow\">shock and fear<\/a> of seeing that someone claims to have control of their PC is enough to trick some victims into making the payment.&nbsp;<\/p>\n<p>Other phishing attacks around cryptocurrency payments aren&#8217;t so blunt, instead attempting to exploit the victim&#8217;s empathy rather than their fear &#8211; for example messages that claim to generate funds for worthy causes but which only serve to benefit the fraudsters sending out the emails.&nbsp;<\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/how-to-keep-your-bank-details-and-finances-more-secure-online\/\" rel=\"follow\"><strong>How to keep your bank details and finances more secure online<\/strong><\/a><\/p>\n<p>Requests for cryptocurrency payments are also appearing in business email compromise scams, fraud attempts where crooks pose as a trusted colleague or business partner, asking for a large sum of money to be transferred in order to complete and important and time-sensitive deal. The attacks might sound relatively simple, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-is-scary-but-another-scam-is-costing-victims-much-much-more-says-fbi\/\" rel=\"follow\">but BEC is one of the most lucrative forms of cyber crime<\/a> \u2013 and cryptocurrency scammers are getting in on the action.&nbsp;<\/p>\n<p>In the example detailed by Proofpoint, an email sent by an attacker \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/this-cybersecurity-threat-costs-business-millions-and-its-the-one-they-often-forget-about\/\" rel=\"follow\">potentially using a legitimate account that belongs to a trusted contact<\/a>&nbsp;\u2013 claims that an urgent payment is required to seal a business acquisition deal. The matter is also described as secretive, so the victim is urged not to tell anyone about it. This, of course, is to make sure the victim doesn&#8217;t discover it is a scam.&nbsp;<\/p>\n<p>In this case, the email requests just over $100,000 be purchased in Bitcoin and transferred to a wallet that supposedly belongs to the new acquisition \u2013 but belongs to the attackers. If the payment is transferred, the attackers walk away with a large sum of money \u2013 and even if the transaction is discovered to be false later, it&#8217;s too late for the victim.&nbsp;<\/p>\n<p>Phishing attacks are common because people can be tricked, leading to success for cyber criminals. The best way to stay protected from phishing and BEC attacks is to be alert about common techniques used by cyber criminals, and to be wary about unsolicited emails demanding money \u2013 especially if they&#8217;re asking for it to be paid in cryptocurrency. &nbsp;<\/p>\n<p><strong>MORE ON CYBERSECURITY<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency is valuable &#8211; and cyber criminals are using a range of techniques to trick victims into sending it to them. Here&#8217;s what to look out for.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47078","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-10T13:35:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto\",\"datePublished\":\"2022-06-10T13:35:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\\\/2021\\\/02\\\/12\\\/898ea4f3-0335-41b8-976b-edc39bee2342\\\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/\",\"name\":\"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\\\/2021\\\/02\\\/12\\\/898ea4f3-0335-41b8-976b-edc39bee2342\\\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\",\"datePublished\":\"2022-06-10T13:35:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\\\/2021\\\/02\\\/12\\\/898ea4f3-0335-41b8-976b-edc39bee2342\\\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\\\/2021\\\/02\\\/12\\\/898ea4f3-0335-41b8-976b-edc39bee2342\\\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/","og_locale":"en_US","og_type":"article","og_title":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-06-10T13:35:06+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto","datePublished":"2022-06-10T13:35:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/","url":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/","name":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856","datePublished":"2022-06-10T13:35:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5985df0a8fe3700351fbb79d1342f80ec0ef1907\/2021\/02\/12\/898ea4f3-0335-41b8-976b-edc39bee2342\/20210211-hassold-danny.jpg?auto=webp&amp;fit=cover&amp;height=482&amp;width=856"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/phishing-fake-landing-pages-and-emails-from-your-boss-how-crooks-are-targeting-your-crypto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing, fake landing pages and emails from your boss: How crooks are targeting your crypto"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47078"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47078\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}