Articles on: Security & Settings

Beware of Scammers in Crypto

Phishing and Scamming in Cryptocurrency



To protect yourself from online scammers in the world of cryptocurrencies, it is useful to understand how online scammers and phishers operate.
Here you will find useful information to recognize and avoid these illegal practices.

Phishing:
Phishing is a form of cybercrime in which online attackers attempt to steal sensitive information, such as passwords, personal information and private keys, from users by posing as a trusted entity, organization or person. This is often done through fake emails, messages, websites or social media, which look like they come from a real and legitimate source. They often work through fake accounts.

Scamming:
Scamming in cryptocurrency is a broader term that refers to various forms of scams, in which fraudsters attempt to deceive people into stealing their money or cryptocurrency. This can be done through phishing, fake investment offers and ponzi schemes.

Here are some of the most common types of scams in the cryptocurrency industry that users should be aware of:

Phishing Scams:
- Fake emails or websites that pretend to be real and legitimate cryptocurrency exchanges or e-wallets, designed to steal your login details.

Ponzi and Pyramid Schemes:
- Investment schemes that promise high returns, but these returns are paid for with the money of new investors, rather than profits from legitimate investments.

Fake ICOs (Initial Coin Offerings):
- Fake startups and/or companies that raise money by selling fake tokens, then disappear once they have raised enough money.

Pump and Dump Schemes:
- Groups that promote a particular cryptocurrency to artificially inflate its price (pump), and then sell all their holdings once the price peaks, causing the price to collapse and other investors to suffer losses (dump).

Malware:
- Malicious software that is sent and downloaded to your device, specifically designed to compromise your cryptocurrency wallets and steal your private keys or passwords.

Fake Exchanges:
- Websites that pretend to be real and legitimate cryptocurrency exchanges, but are designed to steal users’ funds once they make a deposit.

Imitation Scams:
- Scammers who pose as celebrities or well-known figures in the crypto industry, such as Elon Musk, and promise to double your crypto coins if you send them a small amount.

Social Media Scams:
- Fake posts and ads on social media that promise to double your cryptocurrencies or offer investment opportunities with high returns.

Rug Pulls:
- Developers of a new cryptocurrency project, who suddenly pull all the liquidity out of the project and disappear, leaving investors with worthless tokens.

Ponzi Bots and Cloud Mining Scams:
- Websites and apps that claim to let you participate in mining pools or cloud mining services that promise high returns, but in reality steal your money without performing any activity.


Prevention Measures:


Be Suspicious of Unsolicited and Unsolicited Emails and Messages:
- Do not click on links in emails or messages from unknown senders.
- Always check the sender's email address; scammers often use addresses that look like legitimate sources.

Use Two-Factor Authentication (2FA):
- Enable Google 2FA on all your online accounts. This adds an extra layer of security, as you will need a code from your Google Authenticator app in addition to your password. Check out our Knowledge Base article on how to enable 2FA for your Mercury Iconex account.

Check URLs and Domain Names Carefully:
- Only visit official websites and check the URL or domain name carefully before logging in or entering sensitive information. Scammers often use URLs that are very similar to the original website but subtly different.

Use Strong, Unique Passwords:
- Use a unique, strong password for each account. Consider using a password manager to securely store your passwords.

Beware of Unexpected Requests:
- Be extremely cautious if someone unexpectedly asks for payments, money, or personal information online, especially via social media or email.

Install and Update Security Software:
- Make sure your antivirus software and other security programs are up to date to detect and block malware and phishing attacks.

Use Hardware Wallets:
- Store large amounts of cryptocurrency in hardware wallets instead of on exchanges. Hardware wallets are physical devices that store your crypto keys offline, making them less vulnerable to online attacks.

Educate Yourself:
- Stay up to date on the latest phishing and scam techniques. The more you know, the better you can protect yourself.

Extra Tips:


- Research: Do thorough research before investing in anything. Check the background of the project and the people behind it.
- Don't Trust Blindly: Be skeptical of high returns that seem too good to be true.
- Use Well-Known Platforms: Trade and store your cryptocurrencies only on well-known and reputable exchanges, such as Mercury Iconex.
- Educate Yourself: Stay up-to-date on the latest scam techniques that scammers use.

By following these preventive measures and being aware of these common scams, you can better protect yourself from phishing and scams in the cryptocurrency world.

Updated on: 14/12/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!