Fraud Prevention

What are the most common types of cryptocurrency scams?

Cryptocurrency scams come in many forms, including phishing, Ponzi schemes, fake ICOs, impersonation scams, rug pulls, money mule scams, and pump-and-dump schemes, cryptojacking, defrauding the elderly. Below are details on these types of scams and how to protect yourself from them.

01

Phishing Scams

Scammers use deceptive emails, websites, or messages to trick individuals into disclosing personal information such as login credentials, private keys, or other sensitive data.

Protection Tips:

1. Verify Sender Information: Check the email address or URL carefully to ensure it matches the official contact details of the legitimate entity.
2. Avoid Suspicious Links: Do not click on links from unknown or unverified sources. Hover over links to preview the URL before clicking
3. Check for SSL Certificates: Ensure that the website has a secure HTTPS connection. Look for a padlock icon in the browser’s address bar.

4. Enable Two-Factor Authentication (2FA): Add an extra layer of security to your accounts to protect against unauthorized access.

02

Ponzi Schemes

These are fraudulent investment schemes where returns are paid using the contributions of new investors rather than through legitimate business profits. The scheme collapses when it becomes difficult to recruit new investors.

Protection Tips:

1. Be Skeptical of High Returns: Be cautious of investments promising guaranteed high returns with little or no risk.
2. Research Thoroughly: Investigate the investment opportunity by examining the company’s financial status, regulatory compliance, and historical performance.
3. Consult Financial Advisors: Seek advice from certified financial professionals before making significant investment decisions.

03

Fake ICOs (Initial Coin Offerings)

Scammers promote fake ICOs for non-existent cryptocurrency projects to defraud investors.

Protection Tips:

1. Examine the Whitepaper: Review the project’s whitepaper for detailed information on the project’s goals, technology, and business model.
2. Verify the Team: Research the team behind the ICO, including their credentials and past achievements.
3. Check Community Engagement: Look for an active and engaged community. A legitimate project will have a presence on social media and forums.
4. Regulatory Compliance: Ensure the ICO is compliant with relevant regulations and has legal backing.

04

Impersonation Scams

Fraudsters pose as legitimate companies or individuals through fake social media profiles, emails, or other means to deceive victims into sending cryptocurrency or personal information.

Protection Tips:

1. Verify Requests: Always confirm the identity of anyone asking for funds or personal information through official communication channels.
2. Use Trusted Contact Methods: Contact the company or individual using known and reliable methods to verify any requests.
3. Be Cautious with Unsolicited Communication: Be wary of unexpected messages or friend requests, especially those requesting money or sensitive information.

05

Rug Pulls

Developers create a cryptocurrency project, attract investments, then abruptly withdraw all funds and abandon the project, leaving investors with worthless tokens.

Protection Tips:

1. Evaluate Transparency: Invest in projects with clear and transparent teams, and well-defined development roadmaps.
2. Check Developer Anonymity: Be cautious of projects with anonymous or pseudonymous developers.
3. Review Liquidity Locks: Ensure that the liquidity of the project is locked for a specified period to prevent sudden withdrawals.
4. Research Project Background: Look into the project’s history and any past issues.

06

Money Mule Scams

Scammers trick individuals into transferring stolen or illicit funds on their behalf, often disguised as legitimate job offers.

Protection Tips:

1. Scrutinize Job Offers: Be wary of job offers involving financial transactions, especially those from unknown or unverified sources.
2. Avoid Handling Funds for Others: Never agree to transfer money or cryptocurrency on behalf of others.
3. Verify Employment Opportunities: Research the company and verify the legitimacy of job offers before accepting them.

07

Pump-and-Dump Schemes

Scammers artificially inflate the price of a cryptocurrency through false hype or misleading information and then sell off their holdings at the peak, causing the price to plummet.

Protection Tips:

1. Research Before Investing: Avoid making investment decisions based on hype or unsolicited tips. Conduct thorough research on market trends and the project’s fundamentals.
2. Verify Trading Volume: Use blockchain explorers and other tools to verify the coin’s trading volume and liquidity.
3. Consult Reliable Sources: Check news and updates from credible sources to assess the legitimacy of the investment.

08

Defrauding the Elderly

Scammers exploit elderly individuals, often through fraudulent investment offers or technical support scams, taking advantage of their limited familiarity with technology and cryptocurrency.

Protection Tips:

1. Educate Elderly Family Members: Provide information on common scams and encourage them to verify the legitimacy of any investment opportunities or requests for funds.
2. Monitor Financial Activities: Help elderly relatives monitor their financial accounts and transactions for any suspicious activity.
3. Advise on Verification: Encourage them to seek advice from trusted family members or professionals before transferring any money or disclosing personal information.

09

Tech Support Scams

Scammers impersonate tech support representatives to trick individuals into paying for unnecessary services or gaining access to personal information and systems.

Protection Tips:

1. Verify Contact Information: Only use official channels for tech support and be cautious of unsolicited calls or messages.
2. Avoid Sharing Personal Info: Do not disclose passwords or financial details to unknown callers; verify their identity if needed.
3. Control Remote Access: Only grant remote access if you initiated contact with a trusted tech support provider.

10

Government Office Scams

Scammers pose as government officials to trick individuals into providing personal information or making payments under false pretences.

Protection Tips:

1. Verify Official Contact: Contact government agencies directly using official phone numbers or websites to confirm the legitimacy of any communication.
2. Avoid Unsolicited Requests: Do not provide personal information or make payments in response to unexpected calls, emails, or letters claiming to be from government offices.
3. Check for Proof of Identity: If contacted, request official identification or credentials from the supposed government representative.

11

Unregulated Broker Scams

Scammers deceive investors by requesting to become their “Financial Investment Advisor” or “Trader”, often by promising high returns or using deceptive practices to steal funds.

Protection Tips:

1. Verify Regulation: Ensure the broker is registered with a recognized regulatory authority and has proper licensing.
2. Research the Broker: Look into the broker’s reputation, reviews, and track record before investing.
3. Be Cautious of Promises: Avoid brokers offering guaranteed high returns with little risk, as these are often red flags.
4. Use Trusted Platforms: Invest through well-known and reputable platforms that are regulated and have a history of transparency.

12

Large Purchase Scams

Scammers deceive individuals into making large purchases, often for non-existent or inferior products, or through fraudulent transactions.

Protection Tips:

1. Verify Sellers: Check the legitimacy of the seller by researching their reputation, reading reviews, and confirming their contact information.
2. Use Secure Payment Methods: Avoid using untraceable payment methods. Opt for secure and reputable payment options that offer fraud protection.
3. Inspect Products and Terms: Thoroughly review product details, return policies, and terms of sale before committing to a purchase. Be cautious of deals that seem too good to be true.

13

Double Spending Scam

This scam involves spending the same cryptocurrency more than once by exploiting vulnerabilities in the transaction system.

Protection Tips:

1. Confirm Transaction: Ensure the transaction is confirmed by the network before accepting it.

2. Use Reputable Platforms: Use reputable wallets and exchanges with robust security measures.

3. Keep Software Updated: Keep software updated to protect against vulnerabilities.

14

Loan fee Scam

In loan fee scams, scammers promise cryptocurrency loans in exchange for upfront fees. Once the fee is paid, the loan never materializes.

Protection Tips:

1. Avoid paying upfront fees: Legitimate loans do not require significant fees before receiving funds.
2. Research lenders: Verify any company or individual offering loans through independent reviews and trusted sources.
3. Be skeptical of unsolicited offers: Be cautious of loans that promise fast approval or favorable terms without proper checks.

15

Screensharing Scam

Screensharing scams involve scammers tricking victims into sharing their screens, often while posing as tech support, to gain access to sensitive information like login credentials or private keys.

Protection Tips:

1. Avoid Sharing Screens: Never share your screen with unknown individuals or companies. Legitimate organizations will not ask for this.

2. Verify Identity: Verify identities by contacting the company directly through official channels if you’re asked to screenshare.

3. Use Trusted Platforms: Use trusted platforms for screensharing, and only share necessary information when required.

16

Pre-IPO investment Scam

In a Pre-IPO investment scam, fraudsters claim to offer exclusive investment opportunities before an Initial Public Offering (IPO). These projects often don’t exist or are scams.

Protection Tips:

1. Research the Project: Research the project thoroughly, ensuring it is legitimate, transparent, and led by verified professionals.

2. Check regulatory approvals: Verify that the project has proper authorization from financial authorities.

3. Avoid unsolicited offers: Scammers often present exclusive, too-good-to-be-true opportunities.

What are the most common Online Attacks?

01

DDoS Attacks

Attackers overwhelm a server or network with excessive traffic, rendering it unavailable to users.

Protection Tips:

1. Implement Rate Limiting: Use rate limiting to control traffic and mitigate the impact of traffic surges.

2. Use DDoS Protection Services: Employ specialized services that can detect and mitigate DDoS attacks.

3. Distribute Traffic: Utilize Content Delivery Networks (CDNs) to distribute traffic and reduce server load.

4. Monitor Traffic: Regularly monitor network traffic for unusual patterns and respond quickly to anomalies.

02

Account Takeover Attacks

Attackers gain unauthorized access to user accounts by stealing credentials or exploiting vulnerabilities.

Protection Tips:

Attackers gain unauthorized access to user accounts by stealing credentials or exploiting vulnerabilities.

1. Enable Two-Factor Authentication (2FA): Add an extra layer of security to accounts.
2. Use Strong, Unique Passwords: Employ complex, unique passwords for each account and change them regularly.
3. Monitor Account Activity: Regularly check account activity for any unauthorized changes or logins.

03

Cryptojacking

Malware secretly uses a victim’s computing power to mine cryptocurrency for the attacker.

Protection Tips:

1. Install Antivirus Software: Use reputable antivirus software to detect and remove cryptojacking malware.
2. Avoid Suspicious Links: Be cautious about clicking on unknown links or downloading files from untrusted sources.
3. Keep Software Updated: Regularly update operating systems and applications to protect against vulnerabilities.
4. Use Browser Extensions: Install browser extensions that block cryptojacking scripts.

04

SIM Swap Attacks

Attackers gain control of a victim’s phone number by convincing the mobile carrier to transfer it, allowing them to intercept calls and texts.

Protection Tips:

1. Secure Carrier Account: Use strong passwords and 2FA for mobile carrier accounts.
2. Monitor SIM Activity: Watch for unusual account activity or service disruptions.
3. Contact Carrier: Notify your carrier if you suspect your SIM has been swapped.
4. Limit Personal Information Sharing: Avoid sharing personal information that could be used to verify your identity with third parties.

05

Ransomware

Malware encrypts a victim’s data and demands payment for the decryption key.

Protection Tips:

1. Backup Data Regularly: Maintain regular, secure backups of critical data.
2. Update Software: Keep all software and operating systems up to date with the latest security patches.
3. Use Antivirus Protection: Employ reputable antivirus software to detect and block ransomware.

Frequently Asked Questions

  • Enable Two-Factor Authentication (2FA) for all accounts to add an extra layer of security.
  • Use strong, unique passwords for each account, and consider using a password manager.
  • Avoid clicking on suspicious links or downloading attachments from unknown sources.
  • Never share personal information like login credentials or private keys with anyone.
  • Consider using cold wallets (offline storage) for long-term storage of cryptocurrencies to reduce exposure to online threats.
  • Regularly monitor your accounts for any suspicious activity and report anomalies immediately.
  • Don’t advertise your wealth online.
  • Enable 2FA on all crypto accounts, especially exchanges and wallets.
  • Regularly monitor account activity and check for any unauthorized transactions.
  • Avoid using public Wi-Fi for cryptocurrency transactions, as it can expose you to man-in-the-middle attacks.
  • Protect your devices by keeping security software up to date and ensuring they have robust firewalls.
  • Don’t advertise your wealth online.
Keeping your login credentials safe is crucial because it prevents unauthorized access to your accounts, protecting your personal and financial information. It helps avoid financial loss by preventing theft or fraudulent transactions and maintains your privacy by ensuring your sensitive data remains confidential.
  • Fake cryptocurrencies often lack a credible whitepaper, make unrealistic promises, have anonymous developers, and show no real-world activity.
  • Always research the coin and its development team. Check for active development, partnerships, and community engagement.
  • Be cautious of coins that rely heavily on social media hype without providing concrete details on the project’s utility or roadmap.
  • Ensure the exchange is licensed and regulated in the country it operates.
  • Look for transparency about the team, fees, and security measures the exchange uses.
  • Read user reviews and check for any complaints or red flags regarding security or withdrawal issues.
  • A legitimate exchange will use advanced security measures like 2FA, encryption, and cold storage for user funds.
  • Avoid unsolicited communications: Be cautious of unexpected financial offers or requests for personal information, especially via phone or email.
  • Enable account protection: Ensure 2FA is enabled on all crypto-related accounts, and use strong, unique passwords.
  • Monitor account activity: Family members or trusted advisors can assist in monitoring accounts for suspicious behavior.
  • Verify investment opportunities: Make sure to conduct thorough research or seek advice from trusted financial professionals before committing to any crypto investments.

Cryptocurrency transactions are irreversible once confirmed on the blockchain.
Protection:

      • Double-check wallet addresses before sending funds.
      • Only transact with trusted parties, and avoid sending cryptocurrency to individuals or companies you do not know well.
      • Understand that funds lost to scams are often difficult, if not impossible, to recover. In some cases, legal action or law enforcement cooperation may help, but prevention is your best protection.
  • Stop all communication with the suspected scammer and report the activity immediately to the relevant platforms or authorities.
  • Monitor your account for any suspicious behavior and avoid sharing further personal information.
  • Report the scam to local authorities, consumer protection agencies, or financial regulators if necessary.
Yes, our platform monitors transactions for suspicious behaviour and flags them for review. This process may involve additional verification to ensure the safety of user accounts.
We use encryption, 2FA at login and at client withdrawals, and blockchain analysis tools to detect fraudulent behaviour. Our platform also provides educational resources to help users stay informed about scams and best practices for security.
When fraud is reported, we investigate the case and may freeze accounts or funds involved. We cooperate with law enforcement to pursue legal action when necessary.
  1. Unrealistic Promises:

Promises of guaranteed high returns with little or no risk are often a sign of fraud. Be cautious of offers that sound too good to be true.

  1. Lack of Transparency:

Anonymous Teams: Projects with anonymous or unverified teams and lack of clear contact information or regulatory disclosures may be fraudulent.

Opaque Whitepapers: Avoid projects with vague or incomplete whitepapers that lack detailed information about the technology, team, and financials.

  1. Pressure Tactics:

Scammers often create a sense of urgency or use high-pressure tactics to push you into making quick decisions. Take time to evaluate and verify any investment opportunity.

  1. Suspicious Communication:

Unsolicited Messages: Be wary of unsolicited emails, messages, or calls asking for personal information or funds. Always verify the source before taking action.

Impersonation: Watch out for communications from individuals or companies claiming to be reputable but using unofficial channels or fake social media profiles.

  1. Unusual Payment Requests:

Payment in Cryptocurrency: Requests for payment in cryptocurrencies, especially if it’s a lesser-known or obscure coin, can be a red flag.

Request for Remote Access: Scammers may ask for remote access to your computer or wallet to “resolve issues” or “verify” transactions.

  1. Lack of Regulation:

Legitimate projects typically comply with financial regulations and provide evidence of regulatory oversight. Lack of such compliance can be a red flag.

  1. Poorly Designed Websites:

Scams often feature poorly designed websites with grammatical errors, broken links, or a lack of professional appearance. Verify the legitimacy of a website before engaging.

  1. High Volatility and Pump-and-Dump Schemes:

Be cautious of cryptocurrencies that experience extreme price volatility due to sudden hype or misleading information, which may indicate pump-and-dump schemes.

  1. Unverifiable Claims:

Claims of endorsements by celebrities or prominent figures without verifiable evidence can be misleading. Verify such endorsements through reliable sources.

  1. No Proof of Concept:

Be cautious of projects that lack a functional prototype or working product. Ensure that the project has a demonstrated use case and progress before investing.

We provide security updates, guides, and educational resources on our website to help users stay informed about the latest fraud tactics and scams. Our support team is available to assist with questions related to security.
  • Verify URLs: Always ensure you’re on the official website, and avoid using search engines or third-party links to access your account.
  • Monitor your account regularly for suspicious activity, and use 2FA to secure your login information.
If you notice any suspicious activity, contact our support team immediately. We will investigate the issue and take action to secure your account and assets.

Our Latest Articles