Phishing Frenzy: Bybit Heist Sparks Global Scam Surge!
Phishing campaigns surged after the Bybit heist, exploiting anxious customers with fake recovery services. BforeAI found 596 suspicious domains, many spoofing Bybit using typosquatting. Free hosting aided anonymous setups, with the UK leading in malicious registrations. The scammers’ ultimate aim? Snag those Bybit passwords like a seagull after a chip.

Hot Take:
In the world of crypto, it seems the only thing more certain than volatile markets is the abundance of scammers waiting in the wings to prey on unsuspecting victims. The Bybit heist might have been the star of the show, but these phishing campaigns are the theatrical villains stealing the spotlight—or in this case, your passwords and crypto. It’s a phishing frenzy, folks, and everyone’s invited!
Key Points:
- Phishing campaigns surged after the Bybit crypto heist, with 596 suspicious domains detected.
- Domains spoofed Bybit using typosquatting and keywords like “refund” and “recovery.”
- Free hosting services were used for fast, anonymous deployment of phishing sites.
- The UK was the leading origin of confirmed malicious domains.
- North Korean hackers are believed to be behind the $1.5bn Bybit attack.