🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Is Telegram the new hunting ground for hackers? Crypto users are facing an invisible threat
Security risks sound the alarm once again. Senior security researcher Taylor Monahan recently disclosed that a wave of targeted scam activities against Telegram users is spreading globally. Criminals are exploiting the trust in this communication app to launch attacks, resulting in over $300 million in asset losses.
How hackers carry out scams through familiar identities
The cleverness of this attack lies in its highly social engineering design. Hackers first impersonate the victim’s acquaintances or industry insiders to initiate contact on Telegram. Once initial trust is established, scammers invite the target to a seemingly normal online meeting—usually conducted via Zoom.
After the victim joins the meeting, hackers use technical difficulties as an excuse, claiming there are audio issues and proactively offer a “solution.” This so-called patch file appears harmless but secretly contains malicious software. Once the victim downloads and executes it, hackers gain full control of the computer, enabling them to steal sensitive information such as crypto wallet private keys, exchange login credentials, and more.
Why Telegram has become a new target
The crypto community heavily relies on Telegram for information exchange, and this trait also makes the platform a hacker’s paradise. Compared to traditional scams, these attacks are more covert—they combine identity impersonation, software attacks, and social manipulation, lowering victims’ alertness on multiple levels.
Prevention tips