Scam Glossary

Hacks

During a hack, the hacker exploits a vulnerability in a smart contract, protocol, infrastructure, or software, or steals information from their victims to gain unauthorized use of their device and transfer funds directly on their behalf.

Sim swaps

A Sim Swap occurs when the hacker takes control of the victim’s cell phone to sign transactions on their behalf.

Contract exploit

A Contract Exploit occurs when the scammer exploits a vulnerability in a smart contract - such to steal funds from a wallet.

Other hacks

Other hacks can include, for example:

  • A protocol attack: a Protocol Attack occurs when the scammer exploits a vulnerability in protocol - such as governance, to steal funds from them.
  • A man-in-the-middle or infrastructure attack: a Man in middle attack occurs when the scammer exploits a vulnerability in a communication network to intercept information and access log-in information or private wallet keys. For example, during DNS hijacking, hackers manipulate DNS queries to redirect users to malicious sites.