{"id":654,"date":"2022-09-17T18:44:41","date_gmt":"2022-09-17T18:44:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=654"},"modified":"2022-09-17T18:44:41","modified_gmt":"2022-09-17T18:44:41","slug":"%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90-%ec%82%ac%ea%b8%b0","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90-%ec%82%ac%ea%b8%b0\/","title":{"rendered":"\uc554\ud638\ud654\ud3d0 \uc0ac\uae30"},"content":{"rendered":"<p>If you are up to date on current events, you\u2019ve most likely heard of Bitcoin or other types of cryptocurrency. Cryptocurrency has been in vogue for many years and has quickly spread worldwide like wildfire. This has presented new risks for potential investors. People eager to jump on the trend invest in different forms of crypto without taking basic precautions. As a result, they are more likely to be taken advantage of.<\/p>\n\n\n\n<p>\ube44\ud2b8\ucf54\uc778\uacfc \uac19\uc740 \uc554\ud638\ud654\ud3d0\uc5d0 \ub300\ud55c \uaddc\uc81c\uac00 \ubd80\uc871\ud558\uc5ec \uc0ac\uae30\uafbc\uacfc \ud574\ucee4\ub4e4\uc774 \uc27d\uac8c \ub3c8\uc744 \ubc8c \uc218 \uc788\ub294 \ubc29\ubc95\uc744 \ucc3e\uc558\uc2b5\ub2c8\ub2e4. \ubd88\ubc95 \uc554\ud638\ud654\ud3d0 \ud65c\ub3d9\uc73c\ub85c \uc218\ubc31\ub9cc \ub2ec\ub7ec\ub97c \ubc8c\uc5c8\ub2e4\ub294 \ubcf4\ub3c4\uac00 \uc5b8\ub860\uc5d0 \ub098\uc654\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\ub78c\ub4e4\uc774 \ube44\ud2b8\ucf54\uc778\uc5d0 \uc810\uc810 \ub354 \uad00\uc2ec\uc744 \uac00\uc9c0\uba74\uc11c \uc0ac\uae30\uafbc\uacfc \uc0ac\uae30 \uc608\uc220\uac00\ub4e4\ub3c4 \ub9c8\ucc2c\uac00\uc9c0\uc785\ub2c8\ub2e4. \ub300\ubd80\ubd84\uc758 \uc0ac\ub78c\ub4e4\uc740 \uadf8\ub4e4\uc758 \ubc29\ubc95\uc5d0 \uc775\uc219\ud558\uc9c0 \uc54a\uae30 \ub54c\ubb38\uc5d0 \uc0ac\uae30\uafbc\uacfc \uc0ac\uae30\uafbc\ub4e4\uc774 \uc554\ud638\ud654\ud3d0 \uc138\uacc4\uc5d0\uc11c \ud65c\uac1c\ub97c \uce58\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc0ac\uae30\uafbc\ub4e4\uc740 \uc758\uc2ec\ud558\uc9c0 \uc54a\ub294 \ud22c\uc790\uc790\ub4e4\uc744 \uc18d\uc774\uace0 \uc774\uc775\uc744 \uc5bb\uae30 \uc704\ud55c \uc815\uad50\ud55c \ubc29\ubc95\uc744 \uac1c\ubc1c\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>The best way to avoid being scammed outright is by researching and reading how these scams typically operate. In this article, we\u2019ll explore some of the more popular crypto scams out there and see how exactly they manage to trick people. You can protect yourself from falling victim to one of these schemes with a better understanding of the risks involved and what red flags to look for.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-evolution-of-bitcoin-and-cryptocurrency\"><strong>\ube44\ud2b8\ucf54\uc778\uacfc \uc554\ud638\ud654\ud3d0\uc758 \uc9c4\ud654<\/strong><\/h2>\n\n\n<p>\ube44\ud2b8\ucf54\uc778\uc740 \u201c\ud574\uc2dc\u201d\ub77c\ub294 \uc218\ud559\uc801 \ud568\uc218\uc5d0 \uc758\ud574 \uc0dd\uc131\ub41c \ub514\uc9c0\ud138 \uc22b\uc790\uc785\ub2c8\ub2e4. \u201c\uacf5\uac1c\u201d \ubc0f \u201c\uac1c\uc778\u201d \ud0a4\ub97c \ud1b5\ud574 \uc561\uc138\uc2a4\ub418\uba70 \ub514\uc9c0\ud138 \uc6d0\uc7a5\uc778 \ube14\ub85d\uccb4\uc778\uc5d0 \ubcf4\uad00\ub429\ub2c8\ub2e4. \uc6d0\uc7a5\uc740 \ud55c \uacf3\uc5d0 \ubcf4\uad00\ub418\uc9c0 \uc54a\uace0 \uc5ec\ub7ec \uacf3\uc5d0 \ubcf4\uad00\ub429\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc6d0\uc7a5\uc5d0 \uc0c8 \uac70\ub798\ub97c \ucd94\uac00\ud560 \uc218\ub9cc \uc788\uc73c\uba70 \uae30\uc874 \uac70\ub798\ub97c \ubcc0\uacbd\ud558\uac70\ub098 \uc0ad\uc81c\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \ube44\ud2b8\ucf54\uc778 \ubc0f \uae30\ud0c0 \uc554\ud638\ud654\ud3d0\ub294 \uc720\uc0ac\ud55c \uc6d0\uce59\uc5d0 \ub530\ub77c \uc791\ub3d9\ud569\ub2c8\ub2e4. \ub530\ub77c\uc11c \ub204\uad6c\ub098 \uc9c0\uae08\uae4c\uc9c0 \ubc1c\uc0dd\ud55c \ubaa8\ub4e0 \uac70\ub798\ub97c \ubcfc \uc218 \uc788\uc9c0\ub9cc \ub204\uac00 \uc5b4\ub5a4 \ube44\ud2b8\ucf54\uc778\uc744 \uc18c\uc720\ud558\uace0 \uc788\ub294\uc9c0\ub294 \uc544\ubb34\ub3c4 \ubaa8\ub985\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ube44\ud2b8\ucf54\uc778\uc73c\ub85c \ubb34\uc5b8\uac00\ub97c \uad6c\ub9e4\ud558\ub824\uba74 \ube44\ud2b8\ucf54\uc778\uc744 \uacb0\uc81c \uc218\ub2e8\uc73c\ub85c \uc218\ub77d\ud560 \uc758\uc0ac\uac00 \uc788\ub294 \ud310\ub9e4\uc790\ub97c \ucc3e\uc544\uc57c \ud569\ub2c8\ub2e4. \uac70\ub798\ub294 \uc554\ud638\ud654\ud3d0 \uac70\ub798\uc18c\ub97c \ud1b5\ud574 \ub610\ub294 \uc0ac\ub78c\ub4e4 \uac04\uc5d0 \uc9c1\uc811 \uc644\ub8cc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Other firms have followed in Bitcoin\u2019s footsteps by creating their own versions of digital currency. Now, there is a slew of alternative cryptocurrencies, many of which are small copies that change the overall coin supply or hashing algorithms. Ripple and Litecoin are two notable examples. Ethereum, on the other hand, was created to be much more than a digital currency. It is a decentralized platform that can run smart contracts or computer programs that automatically execute when certain conditions are met. This allows for a whole new world of possibilities, such as developing decentralized apps (dapps).<\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0\ub294 \ub9ce\uc740 \uc0ac\ub78c\ub4e4\uc758 \uc0c1\uc0c1\ub825\uc744 \uc0ac\ub85c\uc7a1\uc558\uc73c\uba70 \ucd5c\uadfc \uba87 \ub144 \ub3d9\uc548 \uadf8 \uc778\uae30\ub294 \uae09\uc0c1\uc2b9\ud588\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc774\ub7ec\ud55c \uad00\uc2ec\uc740 \uc0c1\ub2f9\ud55c \uc591\uc758 \uc554\ud638\ud654\ud3d0 \uc0ac\uae30\ub97c \uc720\ubc1c\ud588\uc2b5\ub2c8\ub2e4. \uc544\ub798\uc5d0\uc11c\ub294 \uc8fc\uc758\ud574\uc57c \ud560 \uac00\uc7a5 \uc77c\ubc18\uc801\uc778 \uc720\ud615\uc758 \uc554\ud638\ud654\ud3d0 \uc0ac\uae30\ub97c \uc124\uba85\ud569\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"crypto-mining-scams\"><strong>\uc554\ud638\ud654\ud3d0 \ucc44\uad74 \uc0ac\uae30<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-698\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Mining-Scams-2-1-1024x512.jpg\" alt=\"\uc554\ud638\ud654\ud3d0 \ucc44\uad74 \uc0ac\uae30\" \/><\/figure>\n\n\n\n<p>\ud074\ub77c\uc6b0\ub4dc \ub9c8\uc774\ub2dd\uc740 \ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \uc2dc\uc2a4\ud15c\uc744 \ud1b5\ud574 \ube44\ud2b8\ucf54\uc778\uc744 \uc6d0\uaca9\uc73c\ub85c \ucc44\uad74\ud558\uae30 \uc704\ud574 \ud2b9\uc218 \uc7a5\ube44\ub97c \uc0ac\uc6a9\ud558\ub294 \uc0ac\uae30\uc758 \ud55c \ud615\ud0dc\uc785\ub2c8\ub2e4. \uc774 \ubc29\ubc95\uc744 \ud1b5\ud574 \uc0ac\ub78c\ub4e4\uc740 \uc790\uc2e0\uc758 \ud558\ub4dc\uc6e8\uc5b4\ub97c \uc6b4\uc601\ud558\ub294 \ub370 \ub4dc\ub294 \ub9c9\ub300\ud55c \ucd08\uae30 \ube44\uc6a9\uc774\ub098 \uc720\uc9c0 \uad00\ub9ac \ube44\uc6a9\uc744 \uc9c0\ubd88\ud558\uc9c0 \uc54a\uace0\ub3c4 \uc815\uad50\ud55c \uae30\uc220\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774\uc81c \ubaa8\ub4e0 \ud074\ub77c\uc6b0\ub4dc \ub9c8\uc774\ub2dd\uc774 \uc545\uc758\uc801\uc73c\ub85c \uc218\ud589\ub418\ub294 \uac83\uc740 \uc544\ub2c8\uba70, \uc120\uc758\uc758 \ubaa9\uc801\uc73c\ub85c \uc0ac\uc6a9\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \uc77c\ubd80 \uc0ac\uae30\uafbc\ub4e4\uc740 \ud074\ub77c\uc6b0\ub4dc \ub9c8\uc774\ub2dd\uc744 \uc0ac\uc6a9\ud558\uc5ec \ub2e4\ub978 \uc0ac\ub78c\ub4e4\uc758 \ub3c8\uc744 \ud6d4\uccd0 \uc0ac\uae30\ub97c \uc800\uc9c8\ub800\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ud074\ub77c\uc6b0\ub4dc \ub9c8\uc774\ub2dd\uc744 \ud65c\uc6a9\ud558\ub294 \uc77c\ubd80 \ud22c\uc790 \ud68c\uc0ac\ub294 \ud569\ubc95\uc801\uc774\uba70 \uc0ac\ub78c\ub4e4\uc740 \ub9e4\uc77c \ub3c8\uc744 \ubc8c\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ubd88\ubc95\uc801\uc774\uace0 \ube44\uc724\ub9ac\uc801\uc778 \ud68c\uc0ac\ub4e4\ub3c4 \ub2f9\uc2e0\uc758 \uc800\ucd95\uc744 \uc0ac\ucde8\ud558\ub824\uace0 \ud55c\ub2e4\ub294 \uc810\uc5d0 \uc720\uc758\ud558\uc138\uc694.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-avoid-crypto-mining-scams\">\uc554\ud638\ud654\ud3d0 \ucc44\uad74 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<p>The best way to avoid crypto mining scams is to do your research. Make sure you understand cloud mining and how it works before investing in any firm. Be sure to look for red flags, such as a lack of information on the website, lack of professionalism, or pressure to invest quickly. If you\u2019re unsure about a company, it\u2019s best to stay away and find another crypto-mining opportunity.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"phishing-scams\"><strong>\ud53c\uc2f1 \uc0ac\uae30<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-image-696\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Phishing-Scams-crypto-1024x512.jpg\" alt=\"Phishing Scams crypto\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Phishing-Scams-crypto-1024x512.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Phishing-Scams-crypto-300x150.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Phishing-Scams-crypto-768x384.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Phishing-Scams-crypto.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\ud53c\uc2f1\uc740 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc6f9\uc0ac\uc774\ud2b8\ub85c \uc704\uc7a5\ud55c \uc0ac\uae30\uc131 \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc0ac\uc6a9\ud558\uc5ec \uc0ac\uc6a9\uc790 \uc774\ub984 \ubc0f \ube44\ubc00\ubc88\ud638\uc640 \uac19\uc740 \uc911\uc694\ud55c \ubbfc\uac10\ud55c \ub370\uc774\ud130\ub97c \uc5bb\ub294 \uc0ac\uae30 \ud589\uc704\ub97c \uc124\uba85\ud558\ub294 \uc6a9\uc5b4\uc785\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \uc885\uc885 \uc774\uba54\uc77c\uc774\ub098 Google \uad11\uace0\uc5d0\uc11c \uc804\uc1a1\ub41c \ub9c1\ud06c\ub97c \ud1b5\ud574 \uc774\ub7ec\ud55c \uc0ac\uae30\uc131 \uc0ac\uc774\ud2b8\ub85c \uc774\ub3d9\ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\uae30\uafbc\ub4e4\uc740 \uace0\uac1d\uc5d0\uac8c \uac00\uc9dc \uc774\uba54\uc77c\uc744 \ubcf4\ub0b4 \uadf8\ub4e4\uc758 \uacc4\uc815\uc774\ub098 \uc9c0\uac11\uc774 \uc190\uc0c1\ub418\uc5c8\ub2e4\uace0 \uc124\ub4dd\ud569\ub2c8\ub2e4. \ubb38\uc81c\ub97c \ud574\uacb0\ud558\uae30 \uc704\ud574 \ub9c1\ud06c\ub97c \ud074\ub9ad\ud558\ub77c\ub294 \uc9c0\uc2dc\ub97c \ubc1b\uc2b5\ub2c8\ub2e4. \uc774 \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ub514\uc790\uc778\uacfc \uc0c9\uc0c1 \uad6c\uc131\uacfc \uc720\uc0ac\ud55c \ubc29\uc2dd\uc73c\ub85c \uc2e4\uc81c \uc6f9\uc0ac\uc774\ud2b8\uc640 \uac70\uc758 \ub3d9\uc77c\ud558\uac8c \ubcf4\uc785\ub2c8\ub2e4. \uc774\ub294 \uc0ac\uc6a9\uc790\uac00 \ubbfc\uac10\ud55c \uac1c\uc778 \ub370\uc774\ud130\ub97c \uc81c\ucd9c\ud558\ub3c4\ub85d \uc18d\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc774\uc775 \uc7a0\uc7ac\ub825\uc5d0 \ub530\ub77c \uc0ac\uae30\uafbc\ub4e4\uc740 \ub370\uc774\ud130\ub97c \uc0ac\uc6a9\ud558\uac70\ub098 \ub098\uc911\uc5d0 \uc800\uc7a5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uadf8\ub9ac\uace0 <a href=\"https:\/\/steemit.com\/ethereum\/@dhumphrey\/scam-warning-fake-myetherwallet-phishing-site\" target=\"_blank\" rel=\"noreferrer noopener\">\ub9c8\uc774\uc774\ub354\uc6d4\ub81b \uc0ac\uae30<\/a> is a fantastic example of how these scams operate. The phony website was created to mimic the genuine one, fooling people into giving away their personal information. As a result, the duped people lost a lot of money. It\u2019s frightening to think that the fraudulent Myetherwallet software was among the top three applications in the App Store.<\/p>\n\n\n\n<p>\uc774 \uc0ac\uae30\uac00 \ud655\uc0b0\ub418\uc5b4 \ub9ce\uc740 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc601\ud5a5\uc744 \ubbf8\ucce4\ub2e4\ub294 \uc0ac\uc2e4\uc740 \uc774 \uc0b0\uc5c5\uc774 \uc5bc\ub9c8\ub098 \ucde8\uc57d\ud560 \uc218 \uc788\ub294\uc9c0\ub97c \ubcf4\uc5ec\uc90d\ub2c8\ub2e4. \ub610\ud55c \uc0ac\uc6a9\uc790 \uacf5\uaca9\uc5d0 \ub300\ud55c \ucde8\uc57d\uc131\uc740 \ubb38\uc81c\ub97c \uc545\ud654\uc2dc\ud0b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Another phishing method is the use of \u201cairdrops.\u201d An \u201cairdrop\u201d is when an illegitimate company tries to offer free tokens to people in exchange for downloading their app. They will often need your password and username to access your account and steal your money.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-avoid-crypto-phishing-scams\">\uc554\ud638\ud654\ud3d0 \ud53c\uc2f1 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>\uc815\ubcf4\ub97c \uc720\uc9c0\ud558\uc138\uc694. \uc138\uc0c1\uc744 \ub354 \ub9ce\uc774 \uc774\ud574\ud560\uc218\ub85d \ub354 \ub098\uc544\uc9d1\ub2c8\ub2e4. \ucd5c\uc2e0 \ub274\uc2a4\ub97c \uacc4\uc18d \uc811\ud558\uace0 \uac00\ub2a5\ud55c \ud55c \ub9ce\uc774 \uc77d\uc73c\uc2ed\uc2dc\uc624. \ub274\uc2a4 \uae30\uc0ac\uc640 \ud31f\uce90\uc2a4\ud2b8 \ub610\ub294 \uc624\ub514\uc624 \ud30c\uc77c\uc744 \ub4e3\ub294 \uac83\uc73c\ub85c \ucd5c\uc2e0 \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624. \uc815\ubcf4\ub97c \uc720\uc9c0\ud558\ub294 \ub370\ub294 \uc57d\uac04\uc758 \ub178\ub825\uc774 \ud544\uc694\ud558\uc9c0\ub9cc \uc7a5\uae30\uc801\uc73c\ub85c \ud070 \ub3c4\uc6c0\uc774 \ub420 \uac83\uc785\ub2c8\ub2e4.<\/li>\n<li>Be very careful about putting your personal information online. Make sure the website address says \u201cHTTPS.\u201d If anything about the website is suspicious, don\u2019t fill out any forms. You can ask a friend for their opinion or search for reviews before going any further. Beware of websites that try to rush you with deadlines, as criminals often use this tactic to make people act urgently without thinking clearly.<\/li>\n<li>\ud56d\uc0c1 \uac15\ub825\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc120\ud0dd\ud558\uace0 \ubc18\ub4dc\uc2dc \uae30\uc5b5\ud558\uc138\uc694! \uc628\ub77c\uc778\uc5d0\uc11c \uc0ac\uc6a9\ud560 \uc218 \uc788\ub294 \ube44\ubc00\ubc88\ud638 \uc0dd\uc131 \ub3c4\uad6c\ub97c \uc0ac\uc6a9\ud558\uc5ec \ubcf4\uc548\uc744 \uac15\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uac01 \uacc4\uc815\uc5d0 \ub2e4\ub978 \ube44\ubc00\ubc88\ud638\ub97c \uc0ac\uc6a9\ud558\ub294 \uac83\ub3c4 \uc88b\uc740 \uc0dd\uac01\uc785\ub2c8\ub2e4. \ud558\ub098\uc758 \uacc4\uc815\uc774 \uc190\uc0c1\ub418\uba74 \ub2e4\ub978 \uacc4\uc815\uc740 \uc548\uc804\ud558\uac8c \uc720\uc9c0\ub429\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"malware-scams\"><strong>\uc545\uc131\ucf54\ub4dc \uc0ac\uae30<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-image-685\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Malware-Scams-crypto-1024x512.jpg\" alt=\"\uc554\ud638\ud654\ud3d0 \uc545\uc131\ucf54\ub4dc \uc0ac\uae30\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Malware-Scams-crypto-1024x512.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Malware-Scams-crypto-300x150.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Malware-Scams-crypto-768x384.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Malware-Scams-crypto.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\uc545\uc131\ucf54\ub4dc\ub294 \ucef4\ud4e8\ud130 \uc2dc\uc2a4\ud15c\uc5d0 \uc190\uc0c1\uc744 \uc785\ud788\uac70\ub098 \ubb34\ub2e8\uc73c\ub85c \uc561\uc138\uc2a4\ud558\uae30 \uc704\ud574 \uc0ac\uc6a9\ub418\ub294 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uc785\ub2c8\ub2e4. \ubc14\uc774\ub7ec\uc2a4, \uc6dc \ub610\ub294 \ud2b8\ub85c\uc774 \ubaa9\ub9c8 \ud615\ud0dc\uc77c \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0 \uc0ac\uc6a9\uc790\ub294 \uc545\uc131\ucf54\ub4dc \uacf5\uaca9\uc5d0 \ud2b9\ud788 \uc8fc\uc758\ud574\uc57c \ud569\ub2c8\ub2e4. \ud574\ucee4\uac00 \uc774\ub97c \uc0ac\uc6a9\ud558\uc5ec \uac1c\uc778 \ud0a4\ub098 \uc9c0\uac11 \uc2dc\ub4dc \uad6c\ubb38\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4. \uadf8\ub4e4\uc740 \ud53c\uc2f1 \uc774\uba54\uc77c\uc744 \ubcf4\ub0b4\uac70\ub098 \uac00\uc9dc \uc6f9\uc0ac\uc774\ud2b8\ub97c \ub9cc\ub4e4\uc5b4 \ud53c\ud574\uc790\uac00 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud558\ub3c4\ub85d \uc18d\uc77c \uac83\uc785\ub2c8\ub2e4. \ub2e4\uc6b4\ub85c\ub4dc\ub418\uba74 \uc545\uc131\ucf54\ub4dc\ub294 \ubc31\uadf8\ub77c\uc6b4\ub4dc\uc5d0\uc11c \uc2e4\ud589\ub418\uba70 \uac1c\uc778 \ud0a4\ub098 \uc9c0\uac11 \uc2dc\ub4dc \uad6c\ubb38\uacfc \uac19\uc740 \ubbfc\uac10\ud55c \uc815\ubcf4\ub97c \uacf5\uaca9\uc790\uc5d0\uac8c \uc9c1\uc811 \uc804\uc1a1\ud558\uc5ec \uadf8\uac00 \ub3c8\uc744 \uc644\uc804\ud788 \ud1b5\uc81c\ud560 \uc218 \uc788\ub3c4\ub85d \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uadf8\ub9ac\uace0 <a href=\"https:\/\/www.makeuseof.com\/what-is-clipboard-hijacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc554\ud638\ud654\ud3d0 \ud074\ub9bd\ubcf4\ub4dc \ud558\uc774\uc7ac\ucee4<\/a> was a malware scam that piqued people\u2019s interest. These scammers utilized the Windows clipboard as their weapon. In the past, some of these con artists only tracked a small number of cryptocurrency addresses using the Windows Clipboard, but this one was truly enormous.<\/p>\n\n\n\n<p>The scammers put false addresses into people\u2019s computers. When people copied and pasted the addresses, the coins would go to the scammer\u2019s account.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-know-if-your-computer-is-infected-with-malware\">\ucef4\ud4e8\ud130\uc5d0 \uc545\uc131\ucf54\ub4dc\uac00 \uac10\uc5fc\ub418\uc5c8\ub294\uc9c0 \ud655\uc778\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>PC\uac00 \ub290\ub824\uc9c0\ub294 \uc9d5\ud6c4\ub97c \ubcf4\uc785\ub2c8\ub2e4.<\/li>\n<li>You can\u2019t access certain websites.<\/li>\n<li>Your computer displays pop-up ads even when you\u2019re not browsing the web.<\/li>\n<li>\ud30c\uc77c\uc774\ub098 \ud504\ub85c\uadf8\ub7a8\uc774 \ub204\ub77d\ub41c \uac83\uc744 \ubc1c\uacac\ud588\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\ud5c8\uac00 \uc5c6\uc774 \ud648\ud398\uc774\uc9c0\uac00 \ubcc0\uacbd\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/li>\n<li>Your friends tell you that they\u2019ve been receiving strange emails from you.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-get-rid-of-malware\">\uc545\uc131\ucf54\ub4dc\ub97c \uc81c\uac70\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<p>\ucef4\ud4e8\ud130\uc5d0 \ubc14\uc774\ub7ec\uc2a4\uac00 \uac10\uc5fc\ub418\uc5c8\ub2e4\uace0 \uc0dd\uac01\ub418\uba74 <a href=\"https:\/\/securitybriefing.net\/ko\/%eb%a9%80%ec%9b%a8%ec%96%b4-102\/%eb%a9%80%ec%9b%a8%ec%96%b4-101\/\">\uba40\uc6e8\uc5b4<\/a>, \uc989\uc2dc \uc870\uce58\ub97c \ucde8\ud558\uc2ed\uc2dc\uc624.<\/p>\n\n\n\n<p>If you have anti-malware software installed, run a scan. If you don\u2019t have any installed, now would be a good time to download some (we recommend Malwarebytes).<\/p>\n\n\n\n<p>\uc2a4\uce94\uc774 \uc644\ub8cc\ub418\uba74 \uc548\ud2f0\uba40\uc6e8\uc5b4 \uc18c\ud504\ud2b8\uc6e8\uc5b4\uac00 \uac10\uc5fc\ub41c \ud30c\uc77c \ubaa9\ub85d\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uadf8\ub7f0 \ub2e4\uc74c \uc0ad\uc81c\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>If you can\u2019t access your anti-malware software for some reason, you can try running a scan using an online service such as VirusTotal.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"fake-crypto-wallets\"><strong>\uac00\uc9dc \uc554\ud638\ud654\ud3d0 \uc9c0\uac11<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-image-687\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Fake-Crypto-Wallets-1024x512.jpg\" alt=\"\uac00\uc9dc \uc554\ud638\ud654\ud3d0 \uc9c0\uac11\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Fake-Crypto-Wallets-1024x512.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Fake-Crypto-Wallets-300x150.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Fake-Crypto-Wallets-768x384.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Fake-Crypto-Wallets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\uc0ac\uae30\uafbc\ub4e4\uc740 \uc885\uc885 \uac00\uc9dc \uc9c0\uac11\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc0ac\ub78c\ub4e4\uc774 \ube44\ubc00\ubc88\ud638\uc640 \uac1c\uc778 \ud0a4\ub97c \uacf5\uac1c\ud558\ub3c4\ub85d \uc124\ub4dd\ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \ube44\ud2b8\ucf54\uc778 \uace8\ub4dc\uac00 \uc0c8\ub85c \ub098\uc654\uc744 \ub54c \uc0ac\uae30\uafbc\ub4e4\uc740 <a href=\"https:\/\/bitcoinist.com\/bitcoin-gold-releases-statement-mybtgwallet-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">\ub9c8\uc774\ube44\ud2f0\uc9c0\uc6d4\ub81b.\ucef4<\/a>. \uc774\ub77c\ub294 \uac00\uc9dc \uc9c0\uac11\uc744 \ub9cc\ub4e4\uc5c8\uc2b5\ub2c8\ub2e4. \uc774 \uc6f9\uc0ac\uc774\ud2b8\ub97c \uc0ac\uc6a9\ud568\uc73c\ub85c\uc368 \uc0ac\ub78c\ub4e4\uc740 \uc0ac\uae30\uafbc\ub4e4\uc5d0\uac8c \uac1c\uc778 \ud0a4\ub97c \uacf5\uac1c\ud558\uac8c \ub418\uc5c8\uace0, \uc774\ub294 \uc0ac\uc6a9\uc790 \uacc4\uc815\uc5d0\uc11c \uc218\ubc31\ub9cc \ub2ec\ub7ec\uac00 \ub3c4\ub09c\ub2f9\ud558\ub294 \uacb0\uacfc\ub97c \ucd08\ub798\ud588\uc2b5\ub2c8\ub2e4. \ucd1d \uc0ac\uc6a9\uc790\ub4e4\uc740 \uc774 \uc0ac\uae30\ub85c \uc778\ud574 \uac70\uc758 300\ub9cc \ub2ec\ub7ec\ub97c \uc783\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-avoid-crypto-wallet-scams\">\uc554\ud638\ud654\ud3d0 \uc9c0\uac11 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>\uc554\ud638\ud654\ud3d0 \uc9c0\uac11 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95\uc740 \uc870\uc0ac\ub97c \ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc628\ub77c\uc778 \ub9ac\ubdf0\ub97c \ud655\uc778\ud558\uace0 \ub2e4\uc591\ud55c \uc9c0\uac11\uc744 \ube44\uad50\ud558\uc5ec \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc9c0\uac11 \uc81c\uacf5\uc5c5\uccb4\ub97c \uc0ac\uc6a9\ud558\uace0 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694.<\/li>\n<li>\uc0c8 \uc554\ud638\ud654\ud3d0 \uc9c0\uac11\uc744 \ub9cc\ub4e4 \ub54c\ub294 \ud56d\uc0c1 \uac15\ub825\ud55c \ube44\ubc00\ubc88\ud638\ub97c \uc0ac\uc6a9\ud558\uace0 \uac1c\uc778 \ud0a4\ub97c \ub204\uad6c\uc5d0\uac8c\ub3c4 \uacf5\uac1c\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624. \uc554\ud638\ud654\ud3d0 \uc9c0\uac11\uc774 \uc190\uc0c1\ub418\uc5c8\ub2e4\uace0 \uc0dd\uac01\ub418\uba74 \uc989\uc2dc \ube44\ubc00\ubc88\ud638\ub97c \uc7ac\uc124\uc815\ud558\uace0 \uac1c\uc778 \ud0a4\ub97c \ubcc0\uacbd\ud558\uc2ed\uc2dc\uc624.<\/li>\n<li>URL\uc5d0\uc11c \u201cHTTPS\u201d\uc640 \ubcf4\uc548 \uc5f0\uacb0\uc744 \ub098\ud0c0\ub0b4\ub294 \ub179\uc0c9 \uc7a0\uae08 \uc544\uc774\ucf58\uc774 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"ico-scams\"><strong>ICO \uc0ac\uae30<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-688\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/ICO-SCAMS-crypto-1-1024x512.jpg\" alt=\"ICO \uc0ac\uae30 \uc554\ud638\ud654\ud3d0\" \/><\/figure>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0\uac00 \ub4f1\uc7a5\ud55c \uc774\ud6c4 \uae30\uad00 \ud22c\uc790\uc790\ub4e4\uc740 \ub514\uc9c0\ud138 \uc790\uc0b0\uc5d0 \ud070 \uad00\uc2ec\uc744 \ubcf4\uc5ec\uc654\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub098 \ub9ce\uc740 ICO\uac00 \uc0ac\uae30\ub85c \ubcc0\ubaa8\ud558\uc5ec \uae30\uc5c5\uc774 \ub9c9\ub300\ud55c \uc790\uae08\uc744 \ud655\ubcf4\ud55c \ud6c4 \uc0ac\ub77c\uc84c\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Since the money has already been raised and no regulatory body oversees the creators\u2019 decisions regarding its application, the ICOs are free to do what they want with the money. They can easily walk away with the cash or work within the confines of the law.<\/p>\n\n\n\n<p><a href=\"https:\/\/coinjournal.net\/news\/crypto-startup-giza-pulls-exit-scam-after-raising-more-than-us2m-in-ico\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uae30\uc790 \uc0ac\uae30<\/a> \ub294 \uac70\uc758 200\ub9cc \ub2ec\ub7ec\uac00 \uc758\uc2ec\ud558\uc9c0 \uc54a\ub294 \ud22c\uc790\uc790\ub4e4\ub85c\ubd80\ud130 \ud0c8\ucde8\ub41c \uc0ac\uae30\uc131 ICO \ud65c\ub3d9\uc758 \uc545\uba85 \ub192\uc740 \uc0ac\ub840\uc600\uc2b5\ub2c8\ub2e4. \uc8fc\uc694 \uc81c\uacf5\uc5c5\uccb4\uac00 \uc9c0\uc9c0\uc790\ub4e4\uc774 \ub3c4\ub9dd\uce60 \uc218 \uc788\ub294 \uc774\uc720\ub85c \uc778\ud574 \uae30\uc790\uc640\uc758 \uad00\uacc4\ub97c \ub2e8\uc808\ud588\ub2e4\uace0 \ubc1c\ud45c\ud588\uc744 \ub54c \uacbd\uace0 \uc2e0\ud638\uac00 \ub0a0\ub9ac\uae30 \uc2dc\uc791\ud588\uc2b5\ub2c8\ub2e4. \uace7 \uc0ac\uae30 \ud610\uc758\uac00 \uc774\uc5b4\uc84c\uace0 \uc544\ubb34\ub3c4 \ub3c8\uc744 \ub3cc\ub824\ubc1b\uc744 \uc218 \uc5c6\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc5d4\uc9c0\ub9c8 \uce90\ud138\ub9ac\uc2a4\ud2b8 \ud504\ub85c\uc81d\ud2b8\uc758 \uac1c\ubc1c\uc790\ub4e4\ub3c4 \uc791\ub3d9\ud558\ub294 \uc81c\ud488\uc744 \uac00\uc9c0\uace0 \uc788\uc74c\uc5d0\ub3c4 \ubd88\uad6c\ud558\uace0 450\ub9cc \ub2ec\ub7ec\ub97c \ub4e4\uace0 \ub3c4\ub9dd\ucce4\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-avoid-ico-scams\">ICO \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<p>ICO\uc5d0 \ud22c\uc790\ud560 \ub54c\ub294 \uc2a4\uc2a4\ub85c \uc870\uc0ac\ud558\uace0 \uac10\ub2f9\ud560 \uc218 \uc788\ub294 \uae08\uc561 \uc774\uc0c1\uc744 \ud22c\uc790\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624. \ubc31\uc11c\ub97c \uc77d\uace0 \uacb0\uc815\uc744 \ub0b4\ub9ac\uae30 \uc804\uc5d0 \ud504\ub85c\uc81d\ud2b8\ub97c \uc774\ud574\ud558\uc2ed\uc2dc\uc624.<\/p>\n\n\n\n<p>\ud3c9\ud310\uc774 \uc88b\uc740 ICO\ub97c \ucc3e\uc73c\ub824\uba74 \uae0d\uc815\uc801\uc778 \uc628\ub77c\uc778 \ub9ac\ubdf0\uc640 \uac15\ub825\ud55c \ucee4\ubba4\ub2c8\ud2f0 \uc874\uc7ac\ub97c \ucc3e\uc73c\uc138\uc694. \ub610\ud55c \ud504\ub85c\uc81d\ud2b8\uc5d0 \uc791\ub3d9\ud558\ub294 \uc81c\ud488\uacfc \ubbf8\ub798\uc5d0 \ub300\ud55c \uba85\ud655\ud55c \ub85c\ub4dc\ub9f5\uc774 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"pump-and-dump-scam\"><strong>\ud38c\ud504 \uc564 \ub364\ud504 \uc0ac\uae30<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" class=\"wp-image-690\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Pump-and-Dump-Scam-1-1024x512.jpg\" alt=\"\ud38c\ud504 \uc564 \ub364\ud504 \uc0ac\uae30\" \/><\/figure>\n\n\n\n<p>\ud38c\ud504 \uc564 \ub364\ud504 \uacc4\ud68d\uc740 \uacfc\ub300 \uad11\uace0\ub418\uac70\ub098 \uc2e4\ud328\ud560 \uc6b4\uba85\uc778 \ud68c\uc0ac\uc5d0 \uac1c\uc778\uc774 \ud22c\uc790\ud558\ub294 \ud22c\uc790 \uc0ac\uae30\uc758 \ud55c \ud615\ud0dc\uc785\ub2c8\ub2e4. \uc0ac\uae30\uafbc\ub4e4\uc740 \uc774\ub7ec\ud55c \ud22c\uc790\uc790\ub4e4\uc5d0\uac8c \uc0ac\uae30\uc5d0 \ub3c8\uc744 \ud22c\uc790\ud558\ub3c4\ub85d \uc124\ub4dd\ud55c \ud6c4 \ub192\uc740 \uac00\uaca9\uc5d0 \uc8fc\uc2dd\uc744 \ub9e4\ub3c4\ud569\ub2c8\ub2e4. \ud53c\ud574\uc790\ub4e4\uc740 \ud68c\uc0ac \ub0b4\uc5d0\uc11c \uc2e4\uc81c\ub85c \ubc1c\uc804\ud560 \uac00\ub2a5\uc131\uc774 \uc788\uc5c8\ub294\uc9c0 \uc5ec\ubd80\ub97c \ud310\ub2e8\ud558\uae30 \uc5b4\ub824\uc6b8 \uc218 \uc788\uae30 \ub54c\ubb38\uc5d0 \uc774\ub7ec\ud55c \uc0ac\uae30\ub294 \uc885\uc885 \ub514\uc9c0\ud138 \uc554\ud638\ud654\ud3d0\ub97c \ub300\uc0c1\uc73c\ub85c \ud569\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc77c\ubd80 \ud22c\uc790\uc790\ub4e4\uc740 \ud504\ub85c\uc81d\ud2b8\uc5d0 \ud22c\uc790\ud558\ub294 \uac83\uc744 \uc8fc\uc800\ud560 \uc218 \uc788\uc9c0\ub9cc \uc8fc\uc694 \ud50c\ub808\uc774\uc5b4\uac00 \ud22c\uc790\ud558\uac70\ub098 \ud30c\ud2b8\ub108\uc2ed\uc744 \ub9fa\uc744 \uac83\uc774\ub77c\ub294 \uc57d\uc18d\uc5d0 \uc758\ud574 \uc7a5\ub824\ub429\ub2c8\ub2e4. \uc774\ub294 \ud504\ub85c\uc81d\ud2b8\uac00 \uadf8\ub2e4\uc9c0 \uc720\ub9dd\ud574 \ubcf4\uc774\uc9c0 \uc54a\ub354\ub77c\ub3c4 \uc0ac\ub78c\ub4e4\uc774 \ud504\ub85c\uc81d\ud2b8\ub97c \ubbff\uac8c \ub9cc\ub4ed\ub2c8\ub2e4.<\/p>\n\n\n\n<p>The scammers drive the price by making many people believe in it. When they\u2019re done, and the price can\u2019t go any higher, they sell all at once, causing the price to plummet quickly.<\/p>\n\n\n\n<p>\uc774\ub294 \uba87 \ubd84 \ub9cc\uc5d0 \ubc1c\uc0dd\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4!<\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0 \ud38c\ud504 \uc564 \ub364\ud504 \uc0ac\uae30\uc758 \uc608\ub294 <a href=\"https:\/\/www.justice.gov\/opa\/pr\/bitconnect-founder-indicted-global-24-billion-cryptocurrency-scheme\" target=\"_blank\" rel=\"noreferrer noopener\">\ube44\ud2b8\ucee4\ub125\ud2b8 \uc0ac\uae30<\/a>.<\/p>\n\n\n\n<p>\ube44\ud2b8\ucee4\ub125\ud2b8\ub294 \uace0\uc218\uc775 \ud22c\uc790 \ud504\ub85c\uadf8\ub7a8\uc73c\ub85c \uad11\uace0\ub41c \uc554\ud638\ud654\ud3d0\uc600\uc2b5\ub2c8\ub2e4. \uc2dc\uc7a5\uc758 \ub2e4\ub978 \uc5b4\ub5a4 \uac83\ubcf4\ub2e4 \ud6e8\uc52c \ub192\uc740 \uc6d4 \ucd5c\ub300 40%\uc758 \uc218\uc775\uc744 \uc57d\uc18d\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\ub9ce\uc740 \uc0ac\ub78c\ub4e4\uc774 \ube44\ud2b8\ucee4\ub125\ud2b8\uc5d0 \ud22c\uc790\ud588\uc9c0\ub9cc \uac00\uaca9\uc774 \uace7 \ud3ed\ub77d\ud558\uc5ec \ubaa8\ub4e0 \ub3c8\uc744 \uc783\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0 \ud38c\ud504 \uc564 \ub364\ud504 \uc0ac\uae30\uc758 \ub610 \ub2e4\ub978 \uc608\ub294 <a href=\"https:\/\/www.okta.com\/identity-101\/plus-token\/\" target=\"_blank\" rel=\"noreferrer noopener\">\ud50c\ub7ec\uc2a4\ud1a0\ud070 \uc0ac\uae30<\/a>.<\/p>\n\n\n\n<p>\ud50c\ub7ec\uc2a4\ud1a0\ud070\uc740 \ud22c\uc790\uc5d0 \ub300\ud55c \uc774\uc790\ub97c \uc5bb\ub294 \ubc29\ubc95\uc73c\ub85c \uad11\uace0\ub41c \uc554\ud638\ud654\ud3d0\uc600\uc2b5\ub2c8\ub2e4. \uc2dc\uc7a5\uc758 \ub2e4\ub978 \uc5b4\ub5a4 \uac83\ubcf4\ub2e4 \ud6e8\uc52c \ub192\uc740 \uc6d4 \ucd5c\ub300 9%\uc758 \uc218\uc775\uc744 \uc57d\uc18d\ud588\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc0ac\ub78c\ub4e4\uc740 \ud50c\ub7ec\uc2a4\ud1a0\ud070\uc5d0 \ud22c\uc790\ud588\uc9c0\ub9cc \uac00\uaca9\uc774 \uace7 \ud3ed\ub77d\ud558\uc5ec \ubaa8\ub4e0 \ub3c8\uc744 \uc783\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-to-avoid-pump-and-dump-scams\">\ud38c\ud504 \uc564 \ub364\ud504 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \ubc29\ubc95<\/h3>\n\n\n<p>Before you invest in any cryptocurrency, do your homework. Don\u2019t invest in a new currency if there are a lot of news stories, blog entries, or essays about how popular it is. Look up the coin and read its white paper to learn more about who created it and why. This will help you determine if any pump-and-dump schemes are going on with this currency.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ponzi-crypto-schemes\"><strong>\ud3f0\uc9c0 \uc554\ud638\ud654\ud3d0 \uacc4\ud68d<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" class=\"wp-image-692\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Ponzi-Scam-1024x512.jpg\" alt=\"\ud3f0\uc9c0 \uc0ac\uae30\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Ponzi-Scam-1024x512.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Ponzi-Scam-300x150.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Ponzi-Scam-768x384.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Ponzi-Scam.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\ud3f0\uc9c0 \uc0ac\uae30\ub294 \uc7a0\uc7ac \ud22c\uc790\uc790\uc5d0\uac8c \uc0c8\ub85c\uc6b4 \ud68c\uc6d0\uc744 \ubaa8\uc9d1\ud558\uc5ec \uc218\uc775\uc744 \uc62c\ub9b4 \uc218 \uc788\ub2e4\uace0 \ub9d0\ud558\ub294 \uc0ac\uae30\uc758 \ud55c \uc720\ud615\uc785\ub2c8\ub2e4. \ubb38\uc81c\ub294 \uacb0\uad6d \uacc4\ud68d\uc5d0 \ub3c8\uc744 \ud22c\uc790\ud558\ub294 \uc0c8\ub85c\uc6b4 \uc0ac\ub78c\ub4e4\uc774 \ucda9\ubd84\ud558\uc9c0 \uc54a\uc544\uc11c \ubaa8\ub4e0 \ud22c\uc790\uc790\ub97c \uc9c0\uc6d0\ud560 \uc218 \uc788\ub294 \uc218\uc775\uc774 \ucda9\ubd84\ud558\uc9c0 \uc54a\uc544 \uacc4\ud68d\uc774 \ubb34\ub108\uc9c4\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774 \uacbd\uc6b0 \uc6d0\ub798 \uac00\uc838\uc628 \uae08\uc561\uc774\ub098 \uc0ac\uc6a9\ub41c \uae08\uc561\uc5d0 \uad00\uacc4\uc5c6\uc774 \uacc4\ud68d\uc5d0 \ud22c\uc790\ud55c \ubaa8\ub4e0 \uc0ac\ub78c\uc774 \uc0ac\uae30\ub97c \ub2f9\ud558\uac8c \ub429\ub2c8\ub2e4. \uc0ac\uae30\uafbc\ub4e4\uc740 \ube60\ub974\uac8c \uc774\uc775\uc744 \uc5bb\uace0 \ud53c\ud574\uc790\ub4e4\uc744 \ubc29\uce58\ud569\ub2c8\ub2e4. \ud3f0\uc9c0 \uc0ac\uae30\ub294 \uc554\ud638\ud654\ud3d0 \uc138\uacc4\uc5d0 \uce68\ud22c\ud558\uc5ec \uc804 \uc138\uacc4 \ud22c\uc790\uc790\ub4e4\uc744 \uc18d\uc774\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>\uc774\ub7ec\ud55c \uc720\ud615\uc758 \uc0ac\uae30\ub85c \uc778\ud55c \uc7ac\uc815\uc801 \ud53c\ud574\ub294 \ud30c\uad34\uc801\uc785\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Forsage-crypto, a crypto Ponzi scheme that spanned over two years, duped investors by letting them partake in transactions that used Ethereum, Tron, and Binance smart contracts. Forsage-crypto\u2019s affiliate marketing business model drew investors in with the guarantee of profits. As stated on the <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-134\">SEC\u2019s website<\/a>, Forsage enticed millions of retail investors by offering a user-friendly platform for Ethereums\u2019, Trons\u2019, and Binances\u2019 blockchains. Moreover, it dependably utilized newly invested money to repay earlier participants\u2013a hallmark trait of pyramid schemes.<\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0 \ud3f0\uc9c0 \uc0ac\uae30\uc758 \ub610 \ub2e4\ub978 \uc608\ub294 <a href=\"https:\/\/www.bbc.com\/news\/world-us-canada-62005066\">\uc6d0\ucf54\uc778 \uc0ac\uae30<\/a>. The OneCoin scheme was promoted as a way to earn money by investing in a new cryptocurrency. However, the company has been accused of being a Ponzi scheme. According to the company\u2019s website, it was established in Vietnam, but the country later disputed this claim. Additionally, several disasters across several countries and territories worldwide have revealed that OneCoin is fraudulent.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-recognize-a-ponzi-scam\">\ud3f0\uc9c0 \uc0ac\uae30\ub97c \uc778\uc2dd\ud558\ub294 \ubc29\ubc95<\/h2>\n\n\n<ul class=\"wp-block-list\">\n<li>\uc218\uc775\uc774 \uae30\ud558\uae09\uc218\uc801\uc73c\ub85c \ub192\uc2b5\ub2c8\ub2e4<\/li>\n<li>\ubb34\ud5c8\uac00 \uc911\uac1c\uc778<\/li>\n<li>\ud22c\uba85\uc131 \ubd80\uc871<\/li>\n<li>\ud68c\uc0ac\uc5d0 \ub300\ud55c \uc815\ubcf4 \ubd80\uc871<\/li>\n<li>\ub4f1\ub85d\ub418\uc9c0 \uc54a\uc740 \ud22c\uc790<\/li>\n<\/ul>\n\n\n\n<p>\uc774\ubbf8 \uc0ac\uae30\ub97c \ub2f9\ud588\ub2e4\uba74 \ub2e4\uc74c\uacfc \uac19\uc740 \uba87 \uac00\uc9c0 \uc870\uce58\ub97c \ucde8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SEC\uc5d0 \ubb38\uc758\ud558\uc2ed\uc2dc\uc624 <a href=\"https:\/\/www.sec.gov\/tcr\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sec.gov\/tcr<\/a>. SEC\ub294 \ubbf8\uad6d \uc99d\uad8c \uaddc\uc81c \uae30\uad00\uc73c\ub85c, \ub2e4\uc74c\uc5d0 \ud574\uc57c \ud560 \uc77c\uc5d0 \ub300\ud55c \ub354 \ub9ce\uc740 \uc815\ubcf4\ub97c \uc81c\uacf5\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>FBI\uc5d0 \uc2e0\uace0\ud558\uc2ed\uc2dc\uc624 <a href=\"https:\/\/www.ic3.gov\/Home\/ComplaintChoice\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ic3.gov\/Home\/ComplaintChoice<\/a>. \uadf8\ub4e4\uc740 \uc0ac\uae30\ub97c \uc870\uc0ac\ud558\uace0 \ub3c8\uc744 \ub418\ucc3e\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc904 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>\uc5f0\ubc29\uac70\ub798\uc704\uc6d0\ud68c\uc5d0 \ubb38\uc758\ud558\uc2ed\uc2dc\uc624 <a href=\"https:\/\/www.ftccomplaintassistant.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ftccomplaintassistant.gov\/<\/a>. \uadf8\ub4e4\uc740 \ub3c8\uc744 \ub418\ucc3e\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc904 \uc218 \uc788\uc73c\uba70 \uc0ac\uae30\uafbc\uc774 \ub2e4\ub978 \uc0ac\ub78c\ub4e4\uc744 \uacc4\uc18d \uc0ac\uae30\uce58\ub294 \uac83\uc744 \ubc29\uc9c0\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<li>FINRA\uc5d0 https:\/\/www.finra.org\/\ub85c \ubb38\uc758\ud558\uc2ed\uc2dc\uc624. FINRA\ub294 \ubbf8\uad6d\uc758 \uae08\uc735 \uaddc\uc81c \uae30\uad00\uc785\ub2c8\ub2e4. \uadc0\ud558\ub294 <a href=\"https:\/\/www.finra.org\/investors\/need-help\/file-a-complaint\" target=\"_blank\" rel=\"noreferrer noopener\">\ubd88\ub9cc\uc744 \uc81c\uae30\ud558\uace0 \ubcf4\uace0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4<\/a> \uc911\uac1c\uc5c5\uccb4\uc758 \uc7a0\uc7ac\uc801 \uc0ac\uae30 \ub610\ub294 \uc758\uc2ec\uc2a4\ub7ec\uc6b4 \ud65c\ub3d9\uc744 \uc2e0\uace0\ud558\uc2ed\uc2dc\uc624.<\/li>\n<\/ul>\n\n\n\n<p><strong>\uacb0\ub860<\/strong><\/p>\n\n\n\n<p>\uc554\ud638\ud654\ud3d0 \uc0ac\uae30\ub97c \ud53c\ud558\ub294 \uac00\uc7a5 \uc88b\uc740 \ubc29\ubc95\uc740 \uc219\uc81c\ub97c \ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \ud22c\uc790\ud558\uae30 \uc804\uc5d0 \uc554\ud638\ud654\ud3d0\ub098 \ud504\ub85c\uc81d\ud2b8\ub97c \uc870\uc0ac\ud558\uc138\uc694. \ub610\ud55c \uc554\ud638\ud654\ud3d0\uc5d0 \ub300\ud55c \ub274\uc2a4 \uae30\uc0ac\ub098 \ube14\ub85c\uadf8 \uac8c\uc2dc\ubb3c\uc758 \ucd9c\ucc98\ub97c \ud655\uc778\ud55c \ud6c4 \ubbff\uc73c\uc138\uc694. \ub9c8\uc9c0\ub9c9\uc73c\ub85c, \ub108\ubb34 \uc88b\uac8c \ub4e4\ub9b0\ub2e4\uba74 \uc544\ub9c8\ub3c4 \uc0ac\uc2e4\uc77c \uac83\uc785\ub2c8\ub2e4!<\/p>","protected":false},"excerpt":{"rendered":"<p>\ucd5c\uc2e0 \uc2dc\uc0ac\uc5d0 \uad00\uc2ec\uc774 \ub9ce\uc73c\uc2e0 \ubd84\uc774\ub77c\uba74 \ube44\ud2b8\ucf54\uc778\uc774\ub098 \ub2e4\ub978 \uc720\ud615\uc758 \uc554\ud638\ud654\ud3d0\uc5d0 \ub300\ud574 \ub4e4\uc5b4\ubcf4\uc168\uc744 \uac83\uc785\ub2c8\ub2e4. \uc554\ud638\ud654\ud3d0\ub294 \uc218\ub144 \ub3d9\uc548 \uc720\ud589\ud574 \uc654\uc73c\uba70 ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90\/%ec%95%94%ed%98%b8%ed%99%94%ed%8f%90-%ec%82%ac%ea%b8%b0\/\"><span class=\"screen-reader-text\">\uc554\ud638\ud654\ud3d0 \uc0ac\uae30<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crypto Scams | Security Briefing<\/title>\n<meta name=\"description\" content=\"Are you new to cryptocurrency? here are some warning signs of crypto scams. Learn how to avoid being a victim and what the best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc554\ud638\ud654\ud3d0-\uc0ac\uae30\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crypto Scams | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Are you new to cryptocurrency? here are some warning signs of crypto scams. Learn how to avoid being a victim and what the best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc554\ud638\ud654\ud3d0-\uc0ac\uae30\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-17T18:44:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"13\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Crypto Scams\",\"datePublished\":\"2022-09-17T18:44:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/\"},\"wordCount\":2648,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png\",\"articleSection\":[\"Cryptocurrency\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/\",\"url\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/\",\"name\":\"Crypto Scams | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png\",\"datePublished\":\"2022-09-17T18:44:41+00:00\",\"description\":\"Are you new to cryptocurrency? here are some warning signs of crypto scams. Learn how to avoid being a victim and what the best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png\",\"width\":558,\"height\":500,\"caption\":\"Crypto Scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crypto Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc554\ud638\ud654\ud3d0 \uc0ac\uae30 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uc554\ud638\ud654\ud3d0\uc5d0 \ucc98\uc74c\uc774\uc2e0\uac00\uc694? \uc5ec\uae30 \uc554\ud638\ud654\ud3d0 \uc0ac\uae30\uc758 \uacbd\uace0 \uc2e0\ud638\ub4e4\uc774 \uc788\uc2b5\ub2c8\ub2e4. \ud53c\ud574\uc790\uac00 \ub418\uc9c0 \uc54a\ub294 \ubc29\ubc95\uacfc \ubaa8\ubc94 \uc0ac\ub840\ub97c \ubc30\uc6b0\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc554\ud638\ud654\ud3d0-\uc0ac\uae30\/","og_locale":"ko_KR","og_type":"article","og_title":"Crypto Scams | Security Briefing","og_description":"Are you new to cryptocurrency? here are some warning signs of crypto scams. Learn how to avoid being a victim and what the best practices.","og_url":"https:\/\/securitybriefing.net\/ko\/\uc554\ud638\ud654\ud3d0\/\uc554\ud638\ud654\ud3d0-\uc0ac\uae30\/","og_site_name":"Security Briefing","article_published_time":"2022-09-17T18:44:41+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png","type":"image\/png"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"13\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Crypto Scams","datePublished":"2022-09-17T18:44:41+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/"},"wordCount":2648,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png","articleSection":["Cryptocurrency"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/","url":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/","name":"\uc554\ud638\ud654\ud3d0 \uc0ac\uae30 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png","datePublished":"2022-09-17T18:44:41+00:00","description":"\uc554\ud638\ud654\ud3d0\uc5d0 \ucc98\uc74c\uc774\uc2e0\uac00\uc694? \uc5ec\uae30 \uc554\ud638\ud654\ud3d0 \uc0ac\uae30\uc758 \uacbd\uace0 \uc2e0\ud638\ub4e4\uc774 \uc788\uc2b5\ub2c8\ub2e4. \ud53c\ud574\uc790\uac00 \ub418\uc9c0 \uc54a\ub294 \ubc29\ubc95\uacfc \ubaa8\ubc94 \uc0ac\ub840\ub97c \ubc30\uc6b0\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Crypto-Scams.png","width":558,"height":500,"caption":"Crypto Scams"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cryptocurrency\/crypto-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Crypto Scams"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/656"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=654"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}