top of page
Image de FlyD

Protect yourself

We understand your concerns about crypto mistakes and scams. Trust us to navigate the digital world, providing key insights, guidance, and tools to keep you informed and secure. Let us help you overcome your fears about crypto, guiding you on a safe path to your financial goals.

Top 10 Fundamental Tips

01

Protect your cryptos

Protect your cryptocurrency by keeping your private keys and seed phrases confidential. Sharing them could lead to unauthorized access and potential loss of assets. Safeguard this information to maintain control and security over your digital funds.

02

Do your research

Before investing in any cryptocurrency, conducting thorough research is essential. Familiarize yourself with the technology underpinning the cryptocurrency, its intended purpose or use case, and the team responsible for its development and implementation. Understanding these aspects can help you make informed investment decisions and mitigate risks associated with the volatile crypto market.

03

 Start small and diversify

It's a good idea to start with a small investment and gradually increase your exposure as you become more comfortable with the market. Diversify your portfolio. Don't put all your eggs in one basket. Diversifying your investments across different cryptocurrencies can help reduce risk.

04

Use secure wallets

Safely store your cryptocurrencies in secure wallets to protect them from theft or cyber attacks. Hardware wallets, such as Ledger, are considered one of the most secure options.

05

Stay updated

Cryptocurrency markets are dynamic and subject to rapid changes. Stay informed about market trends, news, and regulatory developments to make better investment decisions.

06

Be prepared for volatility

Cryptocurrency prices can be highly volatile, leading to sudden price fluctuations. Be mentally prepared for market ups and downs.

07

Exercise caution

Cryptocurrency investments carry risks, including the potential for significant losses. Only invest money that you can afford to lose and avoid making emotional decisions based on short-term market movements.

08

Verify your informations

Ensuring the accuracy of information is crucial when making transactions. Before proceeding with any crypto transaction, take the time to verify relevant information such as wallet addresses, transaction amounts and recipient details to avoid potential errors or security risks.

09

Set Realistic Goals

Establish realistic goals for your investments and avoid getting caught up in the hype of quick profits.

10

Beware of scammers

Exercise caution as admins, moderators, and team members typically do not initiate contact. Be cautious of scammers pretending to be them in your direct messages. Refrain from clicking on links shared via direct messages and never disclose your private key or seed phrase. Always authenticate sources and verify information before sharing any personal or financial details.

Discover how to recognize and avoid crypto scams in this essential guide. Learn about common scams, warning signs, and tips to protect your investments.

Let's dive in!

Understanding and Identifying Crypto Scams

Woman holds her cell phone in a hand and taps on it with the other hand. Circle with "ICO" written in it overlooks the image

Fake ICO's (Initial Coin Offerings)

A fraudulent entity creates a fake cryptocurrency project and offers tokens for sale to investors with the promise of high returns. However, the project may not have a viable product or intention to deliver on its promises, resulting in investors losing their money.

Warning signs:

-Lack of transparency: If the project team does not provide clear information about their goals, technology, or roadmap, it could be a red flag.

-Unrealistic promises: Be cautious of projects that guarantee high returns with little to no risk. Always remember the principle of "if it sounds too good to be true, it probably is."

Tips:

1. Research the team: Investigate the project's founders, developers, and advisors. Look for their background, experience, and reputation within the crypto community.

2. Due diligence: Scrutinize the ICO's whitepaper, roadmap, and terms carefully. Verify the project's legitimacy and assess its potential for success.

3. Use trusted platforms: Invest in ICOs listed on reputable cryptocurrency exchanges or platforms. Stay away from offers that come through unsolicited emails or unverified sources.

Three red hooks hanging upwards with "Phishing Alert" written at the bottom

Phishing Scams

Involve fraudsters tricking individuals into revealing their sensitive information, such as private keys or login credentials, by posing as a legitimate entity through deceptive emails, messages, or websites.

Warning signs:

-Suspicious URLs: Watch out for URLs that closely resemble legitimate websites but have slight variations or misspellings.

-Urgency or pressure tactics: Be cautious of emails or messages that create a sense of urgency, asking you to act quickly or disclose sensitive information.

-Unsolicited requests: Be wary of unsolicited communications asking for your private keys, passwords, or other confidential details.

Tips:

1. Double-check URLs: Always verify the legitimacy of a website by checking the URL before entering any sensitive information.

2. Enable two-factor authentication: Add an extra layer of security to your accounts with two-factor authentication to protect against unauthorized access.

3. Use a hardware wallet: Store your private keys in a secure hardware wallet to keep your funds safe from online threats.

Torso of a man in a suit with a pyramid made of $100 bills in one hand and the other hand above the pyramid

Ponzi Schemes

Type of investment scam where returns are paid to earlier investors using the capital of newer investors, rather than profits from any legitimate business activity. The scheme relies on a continuous influx of new investors to sustain the illusion of profitability.

Warning signs:

-Guaranteed high returns with little to no risk: Be wary of projects that promise unrealistic profits without underlying guarantees or sustainable business models.

-Lack of transparency: If the project's creators are secretive about their identities, goals, or operational details, it could be a red flag.

-Dependency on recruitment: Ponzi schemes often rely on recruiting new investors to pay returns to existing participants, creating a cycle of unsustainable growth.

Tips:

1. Conduct thorough research: Investigate the project's team, technology, and business model. Look for reviews and audits to assess its legitimacy.

2. Beware of pressure tactics: Avoid investments that pressure you to act quickly or recruit others. Take your time to make informed decisions.

3. Understand the risks: Educate yourself about Ponzi schemes, their characteristics, and common tactics used by scammers to deceive investors.

4. Seek professional advice: Consult with financial advisors or experts in the crypto space to get a second opinion before making investment decisions.

Virtual safety box with different currency signs emerging from it and written in the foreground "Currency Exchange"

Fake CEX (Centralized Exchange)

When fraudulent individuals or websites pose as legitimate cryptocurrency exchanges to deceive users into depositing their funds. These scammers may lure victims with fake promotions, attractive trading offers, or false promises of high returns, only to steal their money or personal information.

Warning signs:

-Lack of regulation: Fake exchanges often operate without proper licenses or regulatory oversight, making them more susceptible to fraudulent activities.

-Poor website design and functionality: Be cautious of exchanges with unprofessional websites, frequent errors, or a lack of security features like SSL encryption.

-Unrealistic trading volumes and fees: If an exchange claims to have exceptionally high trading volumes or offers significantly lower fees than competitors, it could be a red flag.

-Suspicious withdrawal issues: Delays or difficulties in withdrawing funds from an exchange may indicate liquidity problems or potential scams.

Tips:

1. Research the exchange: Verify the exchange's reputation, reviews from users, and presence on trusted cryptocurrency forums to assess its credibility.

2. Check for regulatory compliance: Ensure the exchange is registered with relevant authorities and complies with AML/KYC regulations to safeguard your investments.

3. Test with small transactions: Start with small deposits and withdrawals to test the exchange's reliability and security before committing large amounts.

Black laptop on a white background with a graphic showing green and red vertical lines sticking out from the screen

Pump and Dump

Scheme where the price of a crypto is artificially inflated (pumped) by the coordinated efforts of a group of traders. Once the price has been pumped up to a certain level, the group sells off their holdings at a profit (dump), causing the price to crash and leaving other investors with losses. This practice is considered market manipulation and is illegal in many jurisdictions.

Warning signs:

-Sudden price spikes: Be cautious of cryptocurrencies that experience rapid and unsustainable price increases within a short period, as they could be manipulated for a pump and dump.

-Anonymous promoters: If the promoters behind a particular cryptocurrency or token remain anonymous or have a questionable reputation, it may signal a pump and dump scheme.

-Aggressive marketing tactics: Watch out for aggressive marketing tactics promising guaranteed returns or urging you to buy quickly before missing out on an opportunity.

-Lack of fundamental value: If a cryptocurrency lacks a credible whitepaper, roadmap, or underlying technology, it could be a target for pump and dump manipulation.

Tips:

1. Do your own research: Conduct thorough research on the cryptocurrency, its team, technology, and market potential before investing to make informed decisions.

2. Avoid FOMO (Fear of Missing Out): Resist the urge to invest based on hype or short-term price movements, as FOMO can lead to impulsive decisions in a pump and dump scenario.

3. Be cautious of high volatility: Exercise caution when trading highly volatile cryptocurrencies, as they are more susceptible to pump and dump schemes.

Three gifts of different colors and sizes next to each other

Fake Giveaways

Scammers employ a deceptive tactic by impersonating reputable figures or organizations, offering fake giveaway opportunities. They convince victims to send crypto to a specified wallet address, promising a greater return or requesting a click on a harmful link for access to the victim's wallet resulting in participants losing their funds.

Warning signs:

-Unrealistic promises: Be wary of giveaways that promise unrealistically high returns or guarantee that you will receive a significant amount of cryptocurrency in return for a small investment or participation.

-Requests for personal information: Avoid giveaways that ask for sensitive personal information like your private keys, passwords, or financial details. Legitimate giveaways do not require this information.

-Lack of official communication channels: If the giveaway lacks official communication channels like a verified website, social media accounts, or a legitimate contact email address, it may be a scam.

-Pressure to act quickly: Scammers often create a sense of urgency by pressuring participants to act quickly or make immediate payments to qualify for the giveaway. Be cautious of such tactics.

Tips:

1. Verify the legitimacy: Before participating in any giveaway, research the sponsoring organization or individual to confirm their credibility and ensure they have a genuine presence in the crypto community.

2. Double-check URLs and social media accounts: Make sure to verify the authenticity of the giveaway by checking the official website URL, social media handles, and communication channels to ensure they are legitimate.

3. Never send money or crypto: Legitimate giveaways do not require participants to send money or cryptocurrency. Avoid any requests for payment to qualify for a giveaway.

4. Use an empty wallet: If you need to provide a wallet address to receive giveaway rewards, make sure to use an empty wallet to avoid the risk of losing your funds.

5. Trust your instincts: If something feels too good to be true or raises suspicion, trust your instincts and refrain from participating in the giveaway.

Someone holding a tablet with one hand pointing at the screen and crypto charts in red stand out

Rug Pulls

Deceptive tactic where creators of a cryptocurrency project suddenly abandon the project after attracting investments, causing the value of the tokens to plummet and investors to lose their funds. It involves the creators pulling out ("pulling the rug") of the project, leaving investors with worthless or significantly devalued tokens.

Warning signs:

-Anonymous or unverified team: If the project team members are anonymous or their identities cannot be verified, it's a red flag. Genuine projects usually have a transparent team with identifiable members.

-Lack of transparency: Projects that lack transparency about their goals, roadmap, or how funds will be used are more likely to be scams. Look for clear and detailed information about the project.

-Limited liquidity or locked funds: Rug pulls often involve locking liquidity or restricting the ability to sell tokens. Be wary of projects that restrict liquidity or have locked funds for an extended period.

-Sudden changes in tokenomics: If the project makes sudden changes to tokenomics or introduces hidden fees, it could be a sign of an impending rug pull.

Tips:

1. Do thorough research: Before investing in any project, research the team behind it, their track record, and the project's goals. Look for independent reviews and feedback from the community.

2. Check the project's credibility: Verify the project's legitimacy by checking for audits, partnerships, and community engagement. Genuine projects are likely to have a strong online presence and positive feedback.

3. Use reputable platforms: Stick to established and reputable cryptocurrency exchanges and platforms to minimize the risk of rug pulls. Avoid investing in projects on obscure or unverified platforms.

4. Diversify your investments: Spread your investments across different projects and asset classes to reduce the impact of potential rug pulls on your overall portfolio.

Several virtual operators in front of their computers with headsets

Impersonation

When scammers impersonate project team members, customer support representatives from legitimate crypto platforms or wallets. They convince users that there is an issue with their account or security, tricking them into providing sensitive information or access to their funds. 

Warning signs:

-Unsolicited contact: Be cautious of unsolicited emails, messages, or phone calls claiming to be from tech support. Legitimate companies usually do not reach out to customers without prior communication.

-Pressure tactics: Fake tech support may use aggressive tactics to pressure you into making quick decisions or sharing sensitive information.

-Request for payment: Be wary of tech support asking for payment or access to your crypto wallets. Legitimate support services rarely ask for payment upfront.

-Poor communication: Look out for poor grammar, spelling errors, and unprofessional communication from supposed tech support representatives.

-Suspicious links: Be cautious of any links or attachments sent to you, as they may contain malware or lead to phishing sites.

Tips:

1. Research before contacting: Always go directly to the official website or contact information of the crypto company for tech support.

2. Verify identity: Ask for credentials and verify the identity of the support representative before sharing any personal information.

3. Keep software updated: Regularly update your crypto software and security programs to protect against vulnerabilities.

4. Trust your instincts: If something feels off, trust your instincts and proceed with caution.

Computer keyboard with a red key written "Sextortion"

Sextortion

Scammers threatening to reveal intimate or embarrassing photos or videos of the victim unless a ransom  is paid, often in crypto. These scammers typically claim to have obtained the compromising material through hacking or other illicit means. They prey on fear, but they often bluff, having hacked nothing more than an old password from an old data breach

Warning signs:

-Unsolicited messages: Be cautious of unsolicited messages from strangers requesting personal or intimate information.

-Threats and blackmail: Sextortion scammers often use threats of releasing sensitive videos or photos to extort money from victims.

-Urgency and pressure: Scammers may create a sense of urgency, demanding immediate payment to prevent the release of compromising material.

-Requests for cryptocurrency: Be wary of requests for payment in cryptocurrency as it is often difficult to trace and recover.

Tips:

1. Protect your personal information: Be cautious of sharing intimate photos or videos with strangers online.

2. Secure your devices: Keep your devices and accounts secure with strong passwords and two-factor authentication to prevent unauthorized access.

3. Report and block: If you receive any suspicious messages or threats, report and block the sender to prevent further contact.

4. Don't pay. If you do, scammers may come back and ask for more.

5. Seek help: If you are a victim of sextortion, seek help from law enforcement, report the incident to the appropriate authorities and do not hesitate to talk to a trusted person about it.

Electronic circuit with a red warning sign emerging

Malware Attacks

Occurs when scammers use malicious software to gain unauthorized access to individuals' devices or accounts in order to steal crypto or sensitive information. This can happen through email attachments, fake websites, or compromised software.

Warning signs:

-Suspicious emails or messages: Be cautious of emails or messages containing suspicious links or attachments, especially if they come from unknown sources.

-Phishing attempts: Watch out for phishing websites that mimic legitimate crypto exchanges or wallets to steal your login credentials.

-Unusual device behavior: If your device is running unusually slow, crashes frequently, or displays pop-up ads, it could be infected with malware.

-Unauthorized transactions: Check your crypto accounts regularly for any unauthorized or suspicious transactions, which could indicate a malware attack.

Tips:

1. Use reliable security software: Install and regularly update reputable antivirus and anti-malware software to detect and remove malicious programs.

2. Keep your software updated: Ensure that your operating system, applications, and security software are up to date with the latest security patches.

3. Be cautious of downloads: Only download software, apps, and files from trusted sources to avoid inadvertently installing malware.

4. Enable two-factor authentication: Add an extra layer of security to your crypto accounts by enabling two-factor authentication to prevent unauthorized access.

5. Backup your data: Regularly backup your important files and crypto wallet information to a secure offline storage device to prevent data loss in case of a malware attack.

Part of a cell phone with a sim card on it and another next to it

SIM Swap

When a scammer convinces your mobile carrier to switch your phone number to a new SIM card, giving them access to your phone number and potentially allowing them to access your sensitive information such as two-factor authentication codes or reset passwords.

Warning signs:

-Sudden loss of cell service: If your phone unexpectedly loses service or displays a "SIM card not detected" error, it could be a sign that your SIM card has been swapped.

-Unauthorized changes to account settings: Keep an eye out for any unauthorized changes to your account settings, such as password resets or SIM card updates.

-Inability to access accounts: If you are suddenly locked out of your crypto accounts or receive notifications of unauthorized login attempts, it may indicate that your SIM card has been compromised.

-Unusual texts or calls: Be cautious of receiving unexpected texts or calls requesting sensitive information or verification codes, as these could be used in a SIM swapping attack to access your accounts.
 

Tips:

1. Use alternative authentication methods: Instead of relying solely on SMS for two-factor authentication, consider using authenticator apps or hardware security keys for an added layer of protection.

2. Enable strong account security: Set up strong and unique passwords for all your crypto accounts, enable two-factor authentication where possible, and regularly monitor account activity for any suspicious behavior.

3. Contact your mobile carrier: If you suspect that your SIM card has been swapped, contact your mobile carrier immediately to report the issue, request a new SIM card, and secure your account with additional safeguards.

4. Be cautious with personal information: Avoid sharing personal information such as account details, passwords, or verification codes over the phone or via text message, especially if the request seems unexpected or suspicious.

Report scams to authorities

If you have been a victim of fraud or encounter a suspicious situation, it's crucial to report it to local authorities promptly. Your report could prevent others from falling prey to similar schemes. Additionally, consider using the provided links to report the scam or seek assistance from international authorities for a more effective response:

Interpol facilitates cooperation and communication among law enforcement agencies worldwide. If the scam involves criminal activities across borders, reporting it to Interpol may be beneficial.

IC3 is established to receive complaints of Internet crime from both the victims themselves and from law enforcement agencies. The IC3 allows users to report online scams, frauds, and other Internet-related criminal activities.

ICPEN is a global network of consumer protection authorities that collaborate to combat cross-border fraudulent activities. They may be able to assist in investigating and addressing the scam.

SEC regulate securities in the United States, which could include certain types of crypto offerings.

FTC works to protect consumers from deceptive and unfair business practices.

We empathize with you if you have fallen victim to a scam. Please understand that there is no shame in this, as it unfortunately affects a significant portion of individuals in the crypto space, including both novices and seasoned investors. Combatting this prevalent issue is a top priority for Thuban, as we strive to educate and empower others to avoid such incidents whenever possible.

 

In this landscape filled with numerous scams, collective action can drive change. By uniting and leveraging the resources of authorities to address the root issues, we each possess the ability to contribute to solutions. Every individual holds the potential to make a difference through small actions - your influence matters, every individual is significant. ❤️

Copyright 2023 Thuban Crypto. All Rights Reserved

bottom of page