[{"data":1,"prerenderedAt":514},["ShallowReactive",2],{"navigation":3,"header":31,"footer":123,"/blog/crypto-security":235,"/blog/crypto-security-surround":503},[4,22],{"title":5,"path":6,"stem":7,"children":8,"page":21},"Introduction","/docs/introduction","1.docs/2.introduction",[9,13,17],{"title":10,"path":11,"stem":12},"Why","/docs/introduction/why","1.docs/2.introduction/1.why",{"title":14,"path":15,"stem":16},"Blockchain as solution?","/docs/introduction/blockchain-as-solution","1.docs/2.introduction/2.blockchain-as-solution",{"title":18,"path":19,"stem":20},"What's the Solution?","/docs/introduction/wag3s-as-solution","1.docs/2.introduction/3.wag3s-as-solution",false,{"title":23,"path":24,"stem":25,"children":26,"page":21},"Api Documentation","/docs/api-documentation","1.docs/3.api-documentation",[27],{"title":28,"path":29,"stem":30},"getting started","/docs/api-documentation/api","1.docs/3.api-documentation/1.api",{"id":32,"title":33,"body":34,"description":100,"extension":101,"meta":102,"mobile":103,"navigation":104,"path":110,"products":111,"seo":120,"stem":121,"__hash__":122},"header/header.yml","Header",{"navigation":35,"products":53,"mobile":93},[36,43,46,49],{"label":37,"dropdown":38,"active_routes":39},"Products",true,[40,41,42],"/ledger","/folio","/hr",{"label":44,"to":45},"About","/about",{"label":47,"to":48},"Pricing","/pricing",{"label":50,"to":51,"badge":52},"Label To Earn","/label-to-earn","New",[54,74],{"key":55,"title":56,"description":57,"icon":58,"color":59,"items":60},"enterprise","Enterprise","Solutions for businesses and teams","i-lucide-building","purple",[61,67],{"key":62,"title":63,"description":64,"to":40,"icon":65,"color":59,"cta":66},"ledger","Ledger","Track and reconcile blockchain transactions, invoices, and corporate finances in real time.","i-lucide-wallet","Explore Ledger",{"key":68,"title":69,"description":70,"to":42,"icon":71,"color":72,"cta":73,"disabled":38},"hr","HR & Payroll","Team management, automated payroll, and onboarding. Launching Q2 2026.","i-lucide-users","indigo","Coming Soon",{"key":75,"title":76,"description":77,"icon":78,"color":79,"items":80},"individual","Individual","Personal finance and portfolio tools","i-lucide-user","blue",[81,87],{"key":82,"title":83,"description":84,"to":41,"icon":85,"color":79,"cta":86},"folio","Folio","Consolidate and visualize your digital assets, holdings, and KPIs across your portfolio.","i-lucide-bar-chart-3","View Folio",{"key":88,"title":89,"description":90,"to":51,"icon":91,"color":59,"cta":92},"learn","Learn & Earn","Earn rewards while learning about DeFi and Web3 finance.","i-lucide-graduation-cap","Start Learning",{"modules_button":37,"connect_wallet":94,"copy":95,"explorer":96,"account":97,"networks":98,"disconnect":99},"Connect Wallet","Copy","Explorer","Account","Networks","Disconnect",null,"yml",{},{"modules_button":37,"connect_wallet":94,"copy":95,"explorer":96,"account":97,"networks":98,"disconnect":99},[105,107,108,109],{"label":37,"dropdown":38,"active_routes":106},[40,41,42],{"label":44,"to":45},{"label":47,"to":48},{"label":50,"to":51,"badge":52},"/header",[112,116],{"key":55,"title":56,"description":57,"icon":58,"color":59,"items":113},[114,115],{"key":62,"title":63,"description":64,"to":40,"icon":65,"color":59,"cta":66},{"key":68,"title":69,"description":70,"to":42,"icon":71,"color":72,"cta":73,"disabled":38},{"key":75,"title":76,"description":77,"icon":78,"color":79,"items":117},[118,119],{"key":82,"title":83,"description":84,"to":41,"icon":85,"color":79,"cta":86},{"key":88,"title":89,"description":90,"to":51,"icon":91,"color":59,"cta":92},{"title":33},"header","arey5eXSyQYzNqCdsFIBApE3tG8sWvy3E-c-8jA3mzo",{"id":124,"title":125,"body":126,"columns":200,"copyright":222,"description":100,"extension":101,"meta":223,"navigation":38,"newsletter":224,"path":225,"seo":226,"social_links":227,"status":232,"stem":233,"__hash__":234},"footer/footer.yml","Footer",{"columns":127,"newsletter":170,"social_links":178,"status":195,"copyright":198},[128,134,142,155],{"label":129,"children":130},"Product",[131,132,133],{"label":63,"to":40},{"label":83,"to":41},{"label":69,"to":42},{"label":135,"children":136},"Resources",[137,140],{"label":138,"to":139},"Documentation","/docs",{"label":141,"to":29},"API Reference",{"label":143,"children":144},"Company",[145,146,149,152],{"label":44,"to":45},{"label":147,"to":148},"Careers","/careers",{"label":150,"to":151},"Contact","/contact",{"label":153,"to":154},"Blog","/blog",{"label":156,"children":157},"Legal",[158,161,164,167],{"label":159,"to":160},"Privacy Policy","/privacy",{"label":162,"to":163},"Terms of Service","/terms",{"label":165,"to":166},"Security","/security",{"label":168,"to":169},"Compliance","/compliance",{"title":171,"label":172,"placeholder":173,"button":174,"description":175,"success_message":176,"success_description":177},"Stay Updated","Subscribe to our newsletter","Enter your email","Subscribe","Get updates on new features and Web3 finance tips.","Subscribed!","You've been subscribed to our newsletter.",[179,183,187,191],{"icon":180,"label":181,"to":182},"i-simple-icons-x","Suivre Wag3s sur X (Twitter)","https://x.com/W3Wag3s",{"icon":184,"label":185,"to":186},"i-simple-icons-discord","Rejoindre le Discord Wag3s","https://discord.gg/yaH7Phazwd",{"icon":188,"label":189,"to":190},"i-simple-icons-telegram","Rejoindre le Telegram Wag3s","https://t.me/wag3s_io",{"icon":192,"label":193,"to":194},"i-simple-icons-linkedin","Suivre Wag3s sur LinkedIn","https://linkedin.com/company/wag3s",{"label":196,"to":197},"Status","https://status.wag3s.io",{"text":199},"© {{year}} Wag3s. All rights reserved.",[201,206,210,216],{"label":129,"children":202},[203,204,205],{"label":63,"to":40},{"label":83,"to":41},{"label":69,"to":42},{"label":135,"children":207},[208,209],{"label":138,"to":139},{"label":141,"to":29},{"label":143,"children":211},[212,213,214,215],{"label":44,"to":45},{"label":147,"to":148},{"label":150,"to":151},{"label":153,"to":154},{"label":156,"children":217},[218,219,220,221],{"label":159,"to":160},{"label":162,"to":163},{"label":165,"to":166},{"label":168,"to":169},{"text":199},{},{"title":171,"label":172,"placeholder":173,"button":174,"description":175,"success_message":176,"success_description":177},"/footer",{"title":125},[228,229,230,231],{"icon":180,"label":181,"to":182},{"icon":184,"label":185,"to":186},{"icon":188,"label":189,"to":190},{"icon":192,"label":193,"to":194},{"label":196,"to":197},"footer","ESfMH3JA2OFdSN5_UCLWf0djP4UsKbmLb0SofBRMu2Q",{"id":236,"title":237,"authors":238,"badge":243,"body":245,"date":487,"description":488,"extension":489,"image":490,"meta":492,"navigation":38,"path":499,"seo":500,"stem":501,"__hash__":502},"posts/3.blog/5.crypto-security.md","Top Crypto Scams and Security Threats",[239],{"name":240,"to":182,"avatar":241},"Wag3s Team",{"src":242},"https://pbs.twimg.com/profile_images/1720428793699926016/yofJTeB6_400x400.jpg",{"label":244},"Security, DeFi, Web3",{"type":246,"value":247,"toc":474},"minimark",[248,252,257,283,287,304,308,325,329,346,350,367,371,387,391,408,412,429,433,450,454],[249,250,251],"p",{},"The cryptocurrency ecosystem, while revolutionary, harbors numerous security threats that can devastate investors and projects. From sophisticated hacking techniques to elaborate social engineering schemes, understanding these risks is crucial for anyone participating in digital asset markets. Let's explore the most dangerous crypto threats and how to protect yourself in this evolving landscape.",[253,254,256],"h2",{"id":255},"rug-pulls","Rug Pulls",[258,259,261,268],"picture-and-text",{":card":260},"true",[249,262,263,267],{},[264,265,266],"strong",{},"Rug pulls"," are exit scams where developers abandon a project and run away with investor funds. These schemes often involve fake liquidity pools, manipulated token prices, and deceptive marketing campaigns. In 2024 alone, rug pulls have cost crypto users over $2.3 billion, making them one of the most prevalent threats in DeFi.",[269,270,272],"template",{"v-slot:image":271},"",[249,273,274],{},[275,276],"img",{"alt":277,"className":278,"height":280,"src":281,"width":282},"Rug Pull",[279],"rounded-lg",400,"https://picsum.photos/id/1074/800/400",800,[253,284,286],{"id":285},"phishing-attacks","Phishing Attacks",[258,288,289,295],{":card":260},[249,290,291,294],{},[264,292,293],{},"Phishing attacks"," involve tricking users into revealing private keys or wallet credentials through fake websites, emails, or social media profiles. Scammers create convincing replicas of popular DeFi platforms or wallet interfaces, then send malicious links through compromised accounts. These attacks have resulted in losses exceeding $500 million in 2024, with sophisticated targeting of whale wallets and project founders.",[269,296,297],{"v-slot:image":271},[249,298,299],{},[275,300],{"alt":301,"className":302,"height":280,"src":303,"width":282},"Phishing",[279],"https://picsum.photos/id/783/800/400",[253,305,307],{"id":306},"smart-contract-exploits","Smart Contract Exploits",[258,309,310,316],{":card":260},[249,311,312,315],{},[264,313,314],{},"Smart contract exploits"," target vulnerabilities in DeFi protocol code, allowing hackers to drain funds or manipulate prices. Flash loan attacks, reentrancy bugs, and oracle manipulation have led to some of the largest crypto hacks in history. The PolyNetwork hack ($611M) and Wormhole bridge exploit ($325M) demonstrate the massive scale of these threats.",[269,317,318],{"v-slot:image":271},[249,319,320],{},[275,321],{"alt":322,"className":323,"height":280,"src":324,"width":282},"Smart Contract",[279],"https://picsum.photos/id/582/800/400",[253,326,328],{"id":327},"dusting-attacks","Dusting Attacks",[258,330,331,337],{":card":260},[249,332,333,336],{},[264,334,335],{},"Dusting attacks"," involve sending tiny amounts of cryptocurrency to numerous wallet addresses to track and de-anonymize users. This seemingly harmless activity enables attackers to link addresses to real-world identities, facilitating targeted attacks, blackmail, or surveillance. Advanced dusting techniques now utilize NFTs and airdrops to increase their effectiveness.",[269,338,339],{"v-slot:image":271},[249,340,341],{},[275,342],{"alt":343,"className":344,"height":280,"src":345,"width":282},"Dusting",[279],"https://picsum.photos/id/1020/800/400",[253,347,349],{"id":348},"bridge-hacks","Bridge Hacks",[258,351,352,358],{":card":260},[249,353,354,357],{},[264,355,356],{},"Cross-chain bridge hacks"," exploit vulnerabilities in protocols that transfer assets between different blockchains. As the DeFi ecosystem becomes more interconnected, bridges have become prime targets, handling billions in daily transaction volume. The Ronin bridge hack ($625M) and Horizon bridge exploit ($100M) highlight the systemic risk posed by these centralized chokepoints.",[269,359,360],{"v-slot:image":271},[249,361,362],{},[275,363],{"alt":364,"className":365,"height":280,"src":366,"width":282},"Bridge",[279],"https://picsum.photos/id/124/800/400",[253,368,370],{"id":369},"social-engineering","Social Engineering",[258,372,373,379],{":card":260},[249,374,375,378],{},[264,376,377],{},"Social engineering attacks"," leverage psychological manipulation to gain access to crypto assets or sensitive information. Impersonation of project teams, fake customer support channels, and romance scams have become increasingly sophisticated, using deepfake technology and AI-generated content to appear legitimate. These human-centric attacks bypass even the most secure technical defenses.",[269,380,381],{"v-slot:image":271},[249,382,383],{},[275,384],{"alt":370,"className":385,"height":280,"src":386,"width":282},[279],"https://picsum.photos/id/996/800/400",[253,388,390],{"id":389},"api-key-compromise","API Key Compromise",[258,392,393,399],{":card":260},[249,394,395,398],{},[264,396,397],{},"API key compromises"," occur when traders or exchanges expose their authentication credentials, allowing unauthorized access to accounts and trading systems. These attacks often target automated trading bots, market-making algorithms, and exchange APIs, enabling attackers to execute trades, withdraw funds, or manipulate markets without detection.",[269,400,401],{"v-slot:image":271},[249,402,403],{},[275,404],{"alt":405,"className":406,"height":280,"src":407,"width":282},"API Security",[279],"https://picsum.photos/id/128/800/400",[253,409,411],{"id":410},"_51-attacks","51% Attacks",[258,413,414,420],{":card":260},[249,415,416,419],{},[264,417,418],{},"51% attacks"," occur when malicious actors control over 50% of a blockchain's mining or staking power, enabling them to manipulate transaction history, double-spend coins, or censor transactions. While primarily affecting smaller proof-of-work networks, these attacks undermine fundamental blockchain security assumptions and can cause significant market disruption.",[269,421,422],{"v-slot:image":271},[249,423,424],{},[275,425],{"alt":426,"className":427,"height":280,"src":428,"width":282},"51% Attack",[279],"https://picsum.photos/id/196/800/400",[253,430,432],{"id":431},"mev-exploitation","MEV Exploitation",[258,434,435,441],{":card":260},[249,436,437,440],{},[264,438,439],{},"Maximal Extractable Value (MEV) attacks"," exploit transaction ordering to profit at the expense of ordinary users. Through techniques like front-running, sandwich attacks, and arbitrage, MEV bots extract billions annually from DeFi users. While not technically illegal, these practices raise serious concerns about market fairness and DeFi accessibility.",[269,442,443],{"v-slot:image":271},[249,444,445],{},[275,446],{"alt":447,"className":448,"height":280,"src":449,"width":282},"MEV",[279],"https://picsum.photos/id/219/800/400",[253,451,453],{"id":452},"regulatory-risks","Regulatory Risks",[258,455,456,462,465],{":card":260},[249,457,458,461],{},[264,459,460],{},"Regulatory uncertainty"," represents one of the most significant systemic threats to the cryptocurrency ecosystem. Sudden policy changes, enforcement actions, and unclear compliance requirements can devastate projects and investors overnight. The ongoing SEC crackdown, international AML/KYC requirements, and varying jurisdictional approaches create a complex landscape of legal risks that traditional investments rarely face.",[249,463,464],{},"As the crypto ecosystem matures, security practices and regulatory clarity will determine which projects survive and thrive. Understanding these threats isn't about fear-mongering—it's about building a more resilient, secure, and sustainable future for decentralized finance.",[269,466,467],{"v-slot:image":271},[249,468,469],{},[275,470],{"alt":471,"className":472,"height":282,"src":473,"width":282},"Regulatory",[279],"https://picsum.photos/id/978/800/800",{"title":271,"searchDepth":475,"depth":475,"links":476},2,[477,478,479,480,481,482,483,484,485,486],{"id":255,"depth":475,"text":256},{"id":285,"depth":475,"text":286},{"id":306,"depth":475,"text":307},{"id":327,"depth":475,"text":328},{"id":348,"depth":475,"text":349},{"id":369,"depth":475,"text":370},{"id":389,"depth":475,"text":390},{"id":410,"depth":475,"text":411},{"id":431,"depth":475,"text":432},{"id":452,"depth":475,"text":453},"2024-10-22T00:00:00.000Z","From Rug Pulls to Sophisticated Hacks - Understanding the Biggest Risks in Crypto","md",{"src":491},"/blog/news/KPI.png",{"keywords":493},[494,495,496,497,498],"crypto scams","crypto security threats","rug pull","crypto hacks","blockchain security","/blog/crypto-security",{"title":237,"description":488},"3.blog/5.crypto-security","9KFvQlllhvGA-Ow_iAMDq_8hoZCxj8VdbIyGlcAkEhQ",[504,509],{"title":505,"path":506,"stem":507,"description":508,"children":-1},"Crypto Payroll Solutions","/blog/crypto-payroll","3.blog/4.crypto-payroll","How blockchain-based payroll systems handle cross-border payments, multi-currency salaries, and tax compliance for distributed teams.",{"title":510,"path":511,"stem":512,"description":513,"children":-1},"The Rise of Cryptocurrencies","/blog/crypto-overview","3.blog/6.crypto-overview","How cryptocurrencies moved from speculation to financial infrastructure, and what that means for businesses.",1773946703279]