This part of the cyberattack is known as phishing.
Security researchers say in most cases users will be directed to either “Download’ or “Login.” And this part will try to get and get access to a user’s crypto wallet or their username and password.
This includes never entering credentials after clicking on a link, and instead, always navigating directly to the site you are trying to log in to.
For organizations, it’s highly recommended to use a secure web gateway that will detect and block phishing attempts.
Recommended endpoint protection includes Avast, ESET Protect, Trend Micro Worry-Free Services, Bitfinder Gravity Zone, and Watchguard.