Crypto Phishing Scams. What are they? In this article, we explore Phishing Scams and how it affects you. This article has nothing to do with “oom Frik-se-Dip shop”. If you do allow yourself to be phished, you will definitely only be telling stories of “the one that got away”.
Crypto Phishing Scams range from basement computer operations to multi-billion Rand operations. Successful operators plan these crypto phishing scams very well. Аs a result, they make millions. This is in stark contrast to the anguish and suffering which it brings to the victims. Phishing is a big problem for legitimate cryptocurrency exchanges such as iCE3X. This is due to the fine balance that we have to strike between convenience and security. Users naturally can only contact the company (where their compromised details have been used). Users have no other recourse if they have been victims of crypto phishing scams. If the company’s services have been used or a users funds held on an account has been moved, the instant human reaction for the user is to seek help. The problem here is the company providing the service can not really assist the user, as their compromised credentials have been used.
This is the one most of us are familiar with. You receive an email which looks like it’s from your bank or building society, but in fact, it is a very well crafted fake email simply wanting you to click on a link which subsequently installs malware on your device which records everything your device does. It then transmits this information to the entity which sent the email to you. You are not special, no one is sitting and looking at you specifically. Usually, these gangs get a database full of internet email addresses from the dark web or scrapers. They then send hundreds of thousands of emails and get lucky when people are not protected.
Did you know you can simply add anything after the first part of your gmail address to create an instant alias email address which you can use as disposable email addresses. For example [email protected] When you register on a website, lets say iCE3.com, simply use [email protected]
This is a scary one. You do a google search for SARS website to do taxes and a “sponsored ad” pops up, you do not notice the spelling in the domain is slightly different and proceed to login, but nothing happens… You have just entered all your security details on a phishing site, which is probably using it to transact online using your money.
They catch you because you think you are amongst friends and you drop your guard ever so slightly. We have all become used to grabbing our phones every five minutes to check our messages. You can not blame yourself for clicking on a link in a group or chat you regularly visit. This is due to social media and newer trends such as facebook or lately telegram groups.
This is where criminals target you specifically. Hackers use a collection of methods along with social engineering to gain access to information about you through friends and family, LinkedIn contacts and leaked databases.
It goes back to 1996. Online scammers were “fishing” for AOL account passwords via email. At the time no-one really knew how to use email or what exactly it was supposed to do). “Ph” is a common hacker replacement for “f” tipping the hat at the original hacker culture known as “phreaking”. The first “hacker” John Draper who was also known as Captain Crunch coined the term. He is credited with the invention of the BLUEBOX, which was used to hack phone systems in order to make free long distance calls. Yes, this is a far cry from today’s crypto phishing scams.
The easier it is for you to access your crypto using technologies such as custodial wallets, the easier it is for a phisher to help themselves to your Catch!
There are millions of records all over the internet which contain sensitive data. Simply using an email and password for account security is like leaving your house to go on holiday and just pulling the front door shut. (GP – We all know you spend half a day welding the burglar bars shut. Planting booby traps in the house and getting out the barbed wire to drag across the gate after the Hilux gets chased out by the overloaded Venter.)
Have a look at this website www.haveibeenpwned.com just to get an idea of the sheer amount of leaked data out there.
Being vigilant and paying attention is your first line of defence. Make use of technologies such as encryption, firewalls, malware protection and 2-factor authentication to create a robust defence. Scammers go for easy targets and vulnerable internet users. Always be suspicious if you receive an unexpected email and verify the email addresses of companies you regularly deal with.
You wouldn’t buy a gun and just put it in a safe without learning how to use it, would you?
Mobile Apps are great and have many uses. They have enriched our lives and have simplified many things. Apps are also to blame for removing a natural layer of suspicion we possess as humans. In its convenience, an App can also pose many problems which we do not consider until its too late. For example, if you use a custodial crypto wallet to store your cryptocurrency. What will happen if a Court orders the operators of the platform to freeze the accounts? Gone is your cryptocurrency. So much for independent wealth or private money…
What will happen if hackers gain access to the platform? Imagine a rogue employee leaking personal information… Gone is your crypto. These Apps are incredibly convenient, extremely well designed and easy to use, but they make you stupid. Be your own bank, understand where and how you store your own assets. It is easy to fall victim to such a crypto phishing scam.
This post is by no means exhaustive (and we are not in the business of writing manuals for crooks). We do not cover all the types of attacks in existence here. The scammers think of new methods every day. Interesting read about sim-swapping (https://medium.com/@CodyBrown/how-to-lose-8k-worth-of-bitcoin-in-15-minutes-with-verizon-and-coinbase-com-ba75fb8d0bac).
The simplest way to defend yourself, above and beyond the basic security precautions, is to use your common sense. Now let that sink in for a minute. Ask yourself this, “Why would I try and find some clever convenient way to have my long-term investments accessible to me at all times”? Unless you are already on the run from the authorities or an angry ex, there simply is no valid reason for anyone not to store their private keys OFFLINE using a secure device such as Trezor to spend crypto when the need arises. If you are a victim of crypto phishing scams it will not matter as much. Your crypto is safe. The worlds most secure cryptography protects it. The idea of accessing your crypto at any time creates more problems than the perceived benefits thereof.
This may sound like counterintuitive advice against falling victim to crypto phishing scams, but consider this: The easier it is for you to access your crypto using technologies such as custodial wallets, the easier it is for a phisher to help themselves to your Catch!
We always like to hear from you so please leave us a comment below.
This article is intended to educate and should in no way be seen as investment advice or an enticement to use the ice3x.com platform. Bitcoin is highly volatile with big profit opportunities but you should also remember that you could lose part or all of your investment whenever you take part in any high risk investment. Bitcoin trading is not a regulated industry in South Africa, which in itself carries additional risks. IF YOU ARE NOT AN ASTUTE BITCOIN TRADER, SEEK INDEPENDENT FINANCIAL ADVICE BEFORE MAKING ANY INVESTMENTS.