Hash of this article (SHA1):35e14cfaaff32c39e94d75a88968168b13bdd3ccd0868b17bb33330fdc31c28d

No.: PandaLY Security Analysis No.109

At a time when meme is hot, it is inevitable that everyone uses TG robots to trade and manage accounts. However, there are frequent security incidents of TG robots on the current chain. The seemingly safe and stable robots are actually full of dangers. We must improve our safety awareness. We must enrich our security measures and never slack off when facing security issues.

If your account has been stolen, please contact us. We have extensive experience and capabilities in handling stolen accounts.

Based on our past actual cases, we have summarized some safety experiences in using TG robots.

Robot Source

There are many types of robots on the market, and we need to be careful when choosing. We must choose robots that have a large number of user experiences. Analogous to exchanges, we must choose large exchanges.

Although small-scale robots offer a lot of discounts on handling fees, the team size is small and it is easy for them to steal. Some robots are actually pure money-swindling tools. As long as the private key is entered, the money will disappear instantly. .

When you enter your private key, the robot is likely to send the private key back to the server. You cannot trust a third-party service. If the project owner wants to do something malicious, they can directly obtain your private key and directly transfer.

Therefore, when choosing a robot, it is best to choose a robot that is well-known, has a community, has Twitter, and has endorsements, and do not change the robot frequently.

Meme was stolen from TG bot, what should I do?

use

When we use the robot normally, never click on the strange links that the robot pops up. The machine may be hacked, causing the robot to send out some phishing links. Once clicked, it may start downloading some virus software and invade your computer. Get your pasteboard.

When using it, you must remember not to put all your eggs in one basket. Divide it into as many accounts as possible. The money you earn can be transferred to a safe exchange address, or other addresses where the private key has not been exported. Each robot account only needs to have a small amount of assets, which can avoid the situation of "taking everything at once" to the greatest extent.

Meme was stolen from TG bot, what should I do?

account

Beware of TG account theft. If your TG account is stolen, there is no way to get back your account. He will be able to use all your robot assets, and you may not know that your account has been stolen. You can increase the complexity of your account password. You can add more verification methods, such as 2FA.

Environmental equipment

If you have mastered the safety principles of using robots, then congratulations, simple scams will not make you easily fooled, then the next thing you need to pay more attention to is the safety of the environment, whether you are using robots to trade or on mobile phones and computers. When trading with other devices, the operating environment must be kept pure.

PC

When we use TG robot on PC, we must import the private key. This process is very dangerous because the computer environment is very uncertain. For example, there will be hacker programs that read your clipboard and your screen information. It can even read your keyboard input. If you want to solve this problem, first think back whether you have ever clicked on any unknown websites, whether the anti-virus software has reported an error, and whether the computer firewall is turned off.

In terms of computer configuration, it is best to use an Apple computer. The MacOS system is indeed better than Windows in terms of security level. Although it is more expensive, it can make your operating environment purer and less susceptible to virus invasion.

Meme was stolen from TG bot, what should I do?

Mobile

The risk to mobile phones is also not small. Hackers can install custom firmware with root backdoors on mobile phones to access all plaintext data. And this installation behavior is likely to happen before the phone is received by the customer, which means that These mobile phones have been illegally hacked from the very beginning.

On the mobile phone side, you should also pay attention to the security of the phone itself. For example, you cannot lend your phone to others easily, you cannot expose your phone password and payment password, and you must ensure that your TG account cannot be lost or stolen, and your cloud disk account cannot be lost. In many past cases, the transfer of assets was actually caused by acquaintances operating mobile phones, or the transfer of assets was carried out directly by knowing the mobile phone password, so it is also important to keep a low profile after making money.

The following points must be done on the mobile phone:

1. Keep your Android device up to date and use a reliable mobile security solution

2. Stick to the official Google Play Store when downloading apps…

3. Check the official website of the app developer or service provider to get the link to the official app. If there is no official download link, then be extra cautious while downloading.

4. Carefully check all steps involving funds in the transaction, whether it is sensitive information or money. In addition, when using the clipboard, check whether the input is correct.

Summarize

Most theft incidents can be avoided. We must start with small things and details, truly achieve unity of knowledge and action, fully establish our own security awareness and our own security routines, and don't wait. Regret after a security incident occurs