You will find more and more videos on social media showing people bragging about profiting from phone scams. Upon closer inspection, the logic behind this is actually quite clear: a major exchange's user data was leaked, and this information fell into the hands of criminals. Some young people use these databases to carry out social engineering scams, impersonating platform customer service or forging verification links to phish users' assets. The problem is even more serious because this has formed an "industry chain"—scam techniques are continuously copied and optimized online, and victims' personal information and asset losses become the bragging capital for these people. This reflects the flaws in the security protection of exchange user data and also warns all traders to stay vigilant.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
You will find more and more videos on social media showing people bragging about profiting from phone scams. Upon closer inspection, the logic behind this is actually quite clear: a major exchange's user data was leaked, and this information fell into the hands of criminals. Some young people use these databases to carry out social engineering scams, impersonating platform customer service or forging verification links to phish users' assets. The problem is even more serious because this has formed an "industry chain"—scam techniques are continuously copied and optimized online, and victims' personal information and asset losses become the bragging capital for these people. This reflects the flaws in the security protection of exchange user data and also warns all traders to stay vigilant.