Microsoft

Tips on how to best secure your crypto

By Matt Muller, Head of Security Operations, CoinbaseAs crypto trading becomes increasingly mainstream, our Security team here at Coinbase has seen cybercriminals getting even more creative and persistent in their attempts to steal assets. While that can sound a little scary at first, the good news is that you can dramatically improve your digital security…

By Matt Muller, Head of Security Operations, CoinbaseAs crypto trading becomes increasingly mainstream, our Security team here at Coinbase has seen cybercriminals getting even more creative and persistent in their attempts to steal assets. While that can sound a little scary at first, the good news is that you can dramatically improve your digital security with just a few easy steps. Not only will this help protect your funds on Coinbase, it can be applied to the rest of your digital life as well!When someone is able to log into one of your accounts to perform fraudulent activity, this is called an “account takeover”, or “ATO” for short. But how do these fraudsters get into your account in the first place? One common method is called a “SIM-swap.” In a SIM-swap attack, fraudsters will actually contact your wireless carrier pretending to be you, and persuade the customer service agent to redirect your cell service to a different device, by changing the SIM card number associated with your account (hence the name of the attack.) Once they succeed, they are able to receive all calls and SMS messages sent to your phone number — including any two-factor authentication codes sent to you via SMS. From there, fraudsters will frequently pair those SMS 2FA codes with stolen passwords to try and log into your email account, social media profiles, cloud storage accounts like Dropbox, or financial accounts like Coinbase.At Coinbase, we do a lot of work behind the scenes to detect and try to stop SIM-swap ATOs targeting our customers’ accounts. We also believe that using SMS-based two-factor authentication (2FA) is better than using no 2FA at all. That said, we encourage everyone to follow the two simple steps below and apply them to all the accounts they care about — not just their Coinbase accounts.Use a password managerYour passwords should be at least 16 characters, extremely complex and unique for your accounts. That’s hard to do by yourself, but password managers like 1Password or Dashlane can be used to create and remember your passwords.Are you currently using a password that has been exposed in a third-party data breach somewhere? You can check to see if you’re using a risky password by visiting haveibeenpwned.com/Passwords.Use 2-factor authentication (2FA)In addition to strong passwords, where available, use two-factor authentication (2FA). And always use the strongest type of 2FA the platform allows, ideally a Yubikey or similar hardware security key.If a service provider doesn’t allow Yubikey, use an authentication app like Google Authenticator or Duo Security instead of SMS-based 2FA if possible.If SMS-based 2FA is the only thing available, at the very least require a one-time 2FA code sent to your device every time you login so someone can’t access your account if they have stolen your password.If an organization doesn’t offer any of these options, consider not using that service.Staying vigilant in the wildIt’s not only important to play defense with the right security tools when protecting your accounts, but it’s also important to stay smart in the wild.Some guidelines:Don’t make yourself a targetDon’t brag about your cryptocurrency holdings online, just like you wouldn’t advertise inheriting $50 million.Review your online presence and see how much personal information someone could learn about you to steal your identity. (The good folks at Consumer Reports put together this self assessment.)Don’t fall for tricksHackers posing as tech support — even bad actors posing as Coinbase customer support specifically — may pressure you for account credentials. Coinbase will never ask you for passwords, 2FA codes, PIN numbers or for remote access to your computer.Coinbase will never ask you to create test accounts on other platforms or provide your ID or banking information over email or social media. We do not offer Facebook support chat and we will never call you by phone.If someone reaches out to you and you’re not sure if it’s a scam, you can reach out to security@coinbase.com to confirm whether it’s legitimate. And remember, Microsoft, Google, and Apple will never call you about your computer.Check the URLScammers create fake sites that look like real exchanges but are designed to steal account information. Double check the web address before you login into your account or input any of your credentials.If we emailed you and include a link, copy the link and paste it into a text editor before entering it into your browser to make sure you know where the link is really taking you.This phishing domain uses an Internationalized Domain Name (IDN) which closely resembles www.coinbase.com. However, looking closer will reveal that the domain is actually www.coįnbase[.]com (note the character accent below the “i”).While Coinbase has gone to great lengths to secure our environment, it’s important that everyone understands their role in maintaining the security chain. By following some basic security steps, you can make sure your crypto stays safe. To learn more, visit our Help Center.Tips on how to best secure your crypto was originally published in The Coinbase Blog on Medium, where people are continuing the conversation by highlighting and responding to this story.
Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Microsoft

Microsoft denies shutting down operations in China

Microsoft China denied it would cease operations in the country, after a screenshot of an internal email from Wicresoft, a Microsoft outsourcing partner, fueled speculation about a potential exit. On Monday, several employees of Wicresoft shared screenshots of layoff emails on social media. The email cites geopolitical tensions and shifts in the global business landscape

Microsoft China denied it would cease operations in the country, after a screenshot of an internal email from Wicresoft, a Microsoft outsourcing partner, fueled speculation about a potential exit. On Monday, several employees of Wicresoft shared screenshots of layoff emails on social media. The email cites geopolitical tensions and shifts in the global business landscape [……
Read More

Continue Reading
Microsoft

Fake Microsoft Office add-in tools push malware via SourceForge

Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims’ computers to both mine and steal cryptocurrency. …

Threat actors are abusing SourceForge to distribute fake Microsoft add-ins that install malware on victims’ computers to both mine and steal cryptocurrency. …
Read More

Continue Reading
Microsoft

How Microsoft’s AI chief measures consumer inroads for Copilot

Advertisement Business How Microsoft’s AI chief measures consumer inroads for Copilot Microsoft AI CEO Mustafa Suleyman speaks at the company’s 50th anniversary celebration in Redmond, Washington, U.S., April 4, 2025. REUTERS/Jeffrey Dastin Microsoft AI CEO Mustafa Suleyman speaks at the company’s 50th anniversary celebration in Redmond, Washington, U.S., April 4, 2025. REUTERS/Jeffrey Dastin Microsoft co-founder

Advertisement

Business

How Microsoft’s AI chief measures consumer inroads for Copilot

05 Apr 2025 08:13AM
(Updated: 05 Apr 2025 08:28AM)



Bookmark



Bookmark



Share

REDMOND, Washington : As Microsoft CEOs past and present gathered here to celebrate the company’s 50th birthday, one leader said he is targeting a particular metric’s improvement to guide his strategy on artificial intelligence.

Mustafa Suleyman, chief executive of Microsoft AI, said his consumer and research division is tracking the usual measures of adoption for the company’s AI assistant called Copilot. These include daily and weekly active users, distribution, and usage intensity for Copilot’s consumer offering, he said.

But Suleyman’s interest lies elsewhere.

“I really, really focus the team on SSR, the rate of successful sessions,” he said in an interview.

In an older era when consumers gave less real-time feedback on software, the time they spent with a product – on social media, for instance – or the problems they could solve represented crude “proxies for quality,” he said.

“Now, we actually get to learn from the anonymized logs and extract the sentiment,” said Suleyman, who joined Microsoft about a year ago after leading the startup Inflection AI. Suleyman was one of the only Microsoft executives other than former CEOs Bill Gates and Steve Ballmer and current CEO Satya Nadella to speak on stage at Microsoft’s Friday event at its Redmond, Washington, headquarters.

Suleyman said Microsoft has tasked an AI model itself to assess such sentiment and help determine Copilot chats’ SSR.

“Over the last four months, it’s gone up dramatically, and that’s what we optimize for,” he said.

Suleyman declined to state the rate in absolute terms or disclose other Copilot metrics.

The company last fall announced a more amiable voice for its consumer Copilot and the ability to analyze web pages for users as they browse.

On Friday, Microsoft demonstrated further features for Copilot: personalized podcasts, a tool to help consumers research complex queries, and eventually a look for Copilot that can be custom to each user and conversation.

“I would definitely go for something that was cutesy,” said Suleyman, “like a little Furby-type thing.”

Source: Reuters

Advertisement

Also worth reading

Advertisement

Read More

Continue Reading
Microsoft

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

Tech Share Share this article Copy link X icon X (Twitter) LinkedIn Facebook Email Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets. By Margaux Nijkerk| Edited by Stephen

Tech

Share this article

X iconX (Twitter)LinkedInFacebookEmail

Microsoft Raises Alarm of Malware Targeting Coinbase, MetaMask Wallets

A new report from Microsoft researchers warned of malware that could steal and decrypt users’ information from 20 of some of the most popular cryptocurrency wallets.

Microsoft shareholders voted against adding bitcoin to its company's treasury. (Photo by Craig T Fruchtman/Getty Images)

What to know:

  • Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.
  • The malware, dubbed StilachiRAT, could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data.”
  • While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat.

Tech giant Microsoft shared a new report warning of malware that targets 20 of the most popular cryptocurrency wallets used with the Google Chrome extension.

STORY CONTINUES BELOW
Don’t miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

Microsoft’s Incident Response researchers raised alarms of a new remote access trojan (RAT), dubbed StilachiRAT, which could deploy “sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data,” the team shared in a blog post.

According to the team, the malware was discovered in November 2024, and it could steal users’ wallet information, and any credentials, including usernames and passwords, stored in their Google Chrome browser. StilachiRAT targets 20 crypto wallets including some of the most widely-used ones like MetaMask, Coinbase Wallet, Phantom, OKX Wallet, and BNB Chain Wallet.

While the malware has not been distributed widely, Microsoft did share that it has not been able to identify what entity is behind the threat and laid out some mitigation guidelines for current targets including installing antivirus software.

“Due to its stealth capabilities and the rapid changes within the malware ecosystem, we are sharing these findings as part of our ongoing efforts to monitor, analyze, and report on the evolving threat landscape,” the team wrote.

Read more: Microsoft Shareholders Vote Down Bitcoin Treasury Proposal

MicrosoftWalletsMetaMaskPhantomcoinbase-walletCoinbase
Margaux Nijkerk

Margaux Nijkerk reports on the Ethereum protocol and L2s. A graduate of Johns Hopkins and Emory universities, she has a masters in International Affairs & Economics. She holds BTC and ETH above CoinDesk’s disclosure threshold of $1,000.

X

!–>!–>!–>
Read More

Continue Reading