$9 Million lost each day in the cryptocurrency scams and phishing constituted 13%!
Scams come in many forms and phishing is one of the most common scams you would encounter in the crypto space. Learn how to identify various forms of phishing and what you can do to safeguard yourself against phishing activities.
4 Main Types of Phishing:
The scammer pretends to be a person from the company, such as an exchange. The scammer impersonates the identity of a real person by using his photo, creating a similar email address or phone number to phish the victims.
B. Fake Emails
The scammer creates fake emails that appear to come from someone you trust, such as a bank, credit card company, company or a popular website. These emails typically trick you into giving away sensitive information, such as your username, password, private key of wallet, personal details and credit card details. Sometimes, the emails will get you to install malicious programs inadvertently on your computer or phone when you click on an infected link or open an infected attachment.
C. Fake Accounts
The scammer creates fake accounts on social media such as Telegram, Whatsapp, Wechat, Facebook, Twitter and LinkedIn. They always claim themselves from the exchange and ask for your personal and sensitive information.
D. Phone Scams
The scammer tries to phish the victim to give away personal and sensitive information by pretending to call from the exchanges. Do not conduct any transaction or give away sensitive details via phone.
How to Protect Yourself
- Never give out personal or sensitive information such as personal details, credit card information and wallet private key over phone calls, messages via Whatsapp, Telegram, Wechat, Facebook, Twitter and LinkedIn.
- Verify with the support team by contacting them via the official communication channels such as official email address before responding to any requests made by the suspicious person or emails.
- Do not respond to the emails sent from the domains other than from the legitimate organisation.
- Do not click links or open attachments in unsolicited emails.
- Type in website addresses when performing any transactions, rather than using links from unsolicited emails.
Contact us at email@example.com should you encounter any suspicious activities or person.