
Crypto security experts said they've managed to find their clients’ vulnerable data, including jogging routes, within minutes, stressing the need for better privacy and security measures, as crypto-related physical attacks are on the rise.
Intelligence On Chain (IOC), a UK-based crypto research and investigation team, said they were tasked by their client with finding out how much could be uncovered about him following a recent targeted attack, as the client was worried about his identity.
The result – the team said that within minutes, they had his jogging route, approximate dates, phone numbers, emails (old & current), passwords, online accounts, and social profiles.
"All traceable. All linked. All from just his handle," IOC said, adding that "That’s how real-world risk starts," as anyone could’ve shown up on his route without him ever knowing how they found him.
According to the experts, even with good wallet hygiene, this client had digital breadcrumbs scattered across the internet, and attackers were aware of it.
Therefore, they've urged crypto holders to keep a low profile both online and in the real world, secure private keys to assets offline, harden your home, avoid easily observed family routines, verify unusual online requests regarding your crypto assets, and have a contingency plan.
For those who have already been breached, IOC recommends changing your phone number, getting a new email, not recycling usernames, changing every password, stopping the use of predictable real-world routines, and removing your real name from public profiles.
"The rise of crypto kidnappings is a stark reminder that new forms of wealth come with new risks. Your digital encryption might be unbreakable, but good personal security matters too," the team concluded.
In a related warning earlier this June, security experts at the Kraken exchange also urged caution at industry conferences, as these are attended by criminals as well. According to the experts, basic situational awareness is often ignored, with unmanned laptops owned by popular crypto protocols left open and unlocked on work settings, while some attendees outside the venue discuss high-value trades while wearing conference lanyards that include their name and company.
Kraken also reminded that public WiFi can be easily spoofed or compromised, scanning random QR codes could expose your wallet to malicious smart contracts designed to drain it, and USB charging stations might be used to install malware or steal data. Additionally, they suggested always keeping a close watch on your food and drinks, as "tampering, though rare, is a real threat, especially in high-stakes environments."
"Not everyone in a conference t-shirt is who they say they are. It is very easy to build cover stories and register under fake personas while at events," the team warned.
Your email address will not be published. Required fields are markedmarked