{"id":2693,"date":"2025-06-12T11:46:57","date_gmt":"2025-06-12T11:46:57","guid":{"rendered":"https:\/\/bitunikey.com\/news\/crypto-conferences-scale-up-so-do-scams-security-experts-warn\/"},"modified":"2025-06-12T11:46:59","modified_gmt":"2025-06-12T11:46:59","slug":"crypto-conferences-scale-up-so-do-scams-security-experts-warn","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/crypto-conferences-scale-up-so-do-scams-security-experts-warn\/","title":{"rendered":"Crypto conferences scale up, so do scams, security experts warn"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">Criminals are using in-person crypto events to launch phishing campaigns and impersonation scams, Kraken warns.<\/p>\n<p>By now, it\u2019s no secret that crypto is becoming mainstream, and with it, a bigger target. From Dubai\u2019s skyline to Singapore\u2019s high-tech halls, crypto conferences have exploded in size and scope. But amid the panels and pitches, Kraken\u2018s chief security officer Nick Percoco warns of a troubling pattern: people in the space may be letting their guard down at the exact moment they should be more alert.<\/p>\n<p>\u201cPersonal security hygiene at crypto conferences has taken a back seat,\u201d Percoco wrote in a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.kraken.com\/news\/industry-news\/crypto-conference-complacency\" target=\"_blank\" rel=\"nofollow\">blog post<\/a>. His team at Kraken has been quietly observing \u2014 and what they\u2019ve seen is hard to ignore.<\/p>\n<p>At recent events, Kraken staff spotted unattended laptops with wallet access left open on expo tables, phones buzzing with wallet notifications while their owners chatted nearby. \u201cIf you\u2019re in crypto, your digital device is not just a phone or a laptop,\u201d Percoco reminds, adding that \u201cit\u2019s a vault.\u201d<\/p>\n<p>In a commentary for crypto.news, Percoco explained that phishing remains the most prevalent and effective scam at conferences \u2014 not because it\u2019s technically sophisticated, but because of how easily it blends in. \u201cThe nature of these events \u2013 including constant networking, QR code scanning, and information sharing \u2013 creates ideal conditions for scammers to blend in and launch attacks with minimal effort,\u201d he said.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cBy exploiting common conference behaviors, attackers can easily distribute malicious links or fake scheduling invites under the guise of professional follow-ups. It\u2019s a low-friction tactic that requires little technical sophistication but can yield significant access and financial rewards if successful.\u201d<\/p>\n<p>Nick Percoco<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\">Conferences now hot targets<\/h2>\n<p>Crypto conferences have always been social hubs, but now they\u2019re also a goldmine of unguarded intel. Percoco shared one scene: a group of conference-goers openly discussing high-value trades on a public sidewalk \u2014 lanyards displaying their names and companies in plain view.<\/p>\n<p>Even if you don\u2019t think anyone\u2019s listening, someone probably is. Public Wi-Fi or QR codes can easily be hijacked. Percoco says it\u2019s not paranoia \u2014 it\u2019s pattern recognition. The suggestion: use burner wallets with minimal funds, and never scan a QR code you can\u2019t verify.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIt only takes a single sticker swap for a bad actor to replace a legitimate QR code on a marketing material with a fake one, putting dozens (if not hundreds) of attendees at risk.\u201d<\/p>\n<p>Nick Percoco<\/p>\n<\/blockquote>\n<p>The threats aren\u2019t theoretical anymore. In France, a series of violent attacks on crypto professionals has underscored the very real danger of being too visible in this space.<\/p>\n<p>In January, David Balland \u2014 co-founder of Ledger, a company known for secure crypto wallets \u2014 was kidnapped at gunpoint from his home. His captors severed his finger and sent it to his business partner as proof, demanding a \u20ac10 million ransom in crypto. His wife was later found tied in the trunk of a car. Both survived, but the ordeal left the community shaken.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>The attackers? Young, organized, and tech-savvy, and reportedly familiar with Balland\u2019s holdings and business ties.<\/p>\n<p>It\u2019s not an isolated case. Other attacks in France have also targeted crypto holders, sometimes extending threats to their families. These are not online scams. These are physical, deliberate abductions. The old \u201cdon\u2019t tell people you\u2019re in crypto\u201d rule just got a lot more literal.<\/p>\n<h2 class=\"wp-block-heading\">Basic mistakes, big consequences<\/h2>\n<p>Percoco\u2019s biggest concern isn\u2019t necessarily complex hacks. It\u2019s basic situational awareness. Crypto folks know how to use cold storage. But when it comes to not leaving a MacBook Pro unlocked in a crowded room? Apparently not so much.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn today\u2019s high-stakes environment, crypto complacency isn\u2019t just a personal risk, it\u2019s a threat to our broader movement.\u201d<\/p>\n<p>Nick Percoco<\/p>\n<\/blockquote>\n<p>That sentiment echoes what a16z crypto has also been telling its community for months if not years: in web3, the perimeter is you. A data breach \u2014 even of your phone number \u2014 can snowball into full-blown identity theft.<\/p>\n<p>Every piece of information attackers glean \u201cmakes it easier for and likelier that they will acquire more,\u201d wrote in a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/a16zcrypto.com\/posts\/article\/how-to-protect-after-data-breach\/\" target=\"_blank\" rel=\"nofollow\">blog post<\/a> Matt Gleason, a security engineer for a16z crypto. Once your personal data is out there, it\u2019s a waiting game. Gleason advises freezing credit at credit bureaus, enabling multi-factor authentication with hardware keys like YubiKey, and locking down sensitive apps behind Face ID. SIM protection with mobile carrier is also a must.<\/p>\n<p>On top of that, Gleason suggests to rethink passwords. Use a manager, create a vault and don\u2019t reuse passwords. And watch for red flags like unsolicited calls or unexpected login notifications. The goal isn\u2019t just to react \u2014 it\u2019s to make yourself a harder target.<\/p>\n<h2 class=\"wp-block-heading\">Culture shift might be needed<\/h2>\n<p>Back on the conference floor, Percoco urged attendees to adopt a more security-conscious mindset. He particularly emphasized the importance of verifying identities, avoiding sensitive discussions in public areas, keeping an eye on personal belongings, and steering clear of free charging stations, which could potentially install malware through a method known as \u201cjuice jacking.\u201d<\/p>\n<p>According to Percoco, attackers don\u2019t operate at random. They often assess visible details like names and company affiliations on lanyards to quickly identify high-value targets such as developers, DAO contributors, or startup teams. Once a target is chosen, they may receive phishing links disguised as calendar invites or Zoom calls, designed to establish a foothold on the victim\u2019s device. As Percoco says, the first step \u201ccan be all it takes to breach a device and move laterally from there.\u201d<\/p>\n<p>This isn\u2019t about paranoia. It\u2019s about catching up with reality. As the crypto industry gains legitimacy, it\u2019s also gaining enemies \u2014 from state-sponsored hackers to opportunistic criminals. Security culture has to evolve with it.<\/p>\n<p>Percoco also believes there\u2019s no silver bullet for eliminating scammers from industry events entirely. But he pointed out that conferences already collect significant attendee data \u2014 including names, emails, and phone numbers \u2014 for legitimate logistical purposes. Under the wrong circumstances, that same data \u201ccan be leveraged by malicious actors under the right circumstances,\u201d he adds.<\/p>\n<p>A16z crypto emphasizes that cybersecurity is \u201cno longer optional,\u201d adding forward that it has become a \u201cnecessity.\u201d<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Criminals are using in-person crypto events to launch phishing campaigns and impersonation scams, Kraken warns. By now, it\u2019s no secret that crypto is becoming mainstream, and with it, a bigger&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/2693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=2693"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/2693\/revisions"}],"predecessor-version":[{"id":2695,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/2693\/revisions\/2695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/2694"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=2693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=2693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=2693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}