Encryption scam insider exposed: Scammer confesses revealing methods of operation and prevention tips

robot
Abstract generation in progress

The Inside Story of Encryption Fraud: A Fraudster's Confession and Prevention Advice

A researcher in the encryption field recently interviewed a person involved in cryptocurrency asset fraud, revealing the methods used by scammers and summarizing some practical self-protection measures. The following are the main points from this interview:

Who are the potential victims?

Anyone can become a target of scams, but inexperienced users are more easily deceived. Scammers often use social engineering techniques to gain the trust of their victims. Common methods include inducing downloads of software or requesting sensitive information such as passwords or mnemonic phrases.

How much is the profit from fraud?

Profits depend on the skills and methods of the scammer. Even a scammer with only six months of experience can easily make 5000-10000 USD per month.

What data do scammers steal?

In addition to directly stealing encryption assets, scammers may also engage in illegal activities such as extortion and stealing personal information. Stolen data may circulate on the internet and be exploited by other criminals.

For example, if a user installs malware, scammers may gain access to all computer data and attack wallets with password cracking programs. Setting a complex password of more than 15-20 characters can effectively prevent this.

Conversation encryption scammers: There are many fraud tactics, how to protect your encryption assets?

How to launder money?

The interviewees revealed a method for converting scam proceeds into US dollars:

  1. Store funds on the BSC network
  2. Exchange the token for XRP
  3. Transfer to a certain trading platform through false KYC
  4. Withdraw tokens on another trading platform
  5. Exchange tokens for cash

Precautionary Recommendations

  1. Use antivirus software
  2. Do not save passwords in the browser.
  3. Restrict network download permissions
  4. Use strong passwords for wallets and other websites
  5. Do not take screenshots or save photos of the mnemonic phrase/password.

In addition, attention should also be paid to social media security guidelines to understand how to deal with devices that have been implanted with malware, change account passwords, set up two-factor authentication, reinstall the operating system, and so on.

To protect your encryption assets, you not only need to know how to make money but also learn how to safeguard your wealth.

Dialogue encryption scammers: there are many fraud tactics, how to protect your encryption assets?

XRP-0.35%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Repost
  • Share
Comment
0/400
AlwaysAnonvip
· 08-07 22:49
The stolen ones are all noobs.
View OriginalReply0
BoredWatchervip
· 08-07 15:21
Be Played for Suckers requires experience... truly knowledgeable
View OriginalReply0
PretendingToReadDocsvip
· 08-07 15:18
Brothers, let's have a good memory, okay?
View OriginalReply0
defi_detectivevip
· 08-07 15:02
5k a month? That's too easy, right?
View OriginalReply0
DeFiChefvip
· 08-07 15:00
Hmph, an old hand has seen it all.
View OriginalReply0
ZenMinervip
· 08-07 14:56
Being at a disadvantage means being fooled. I am just an old sucker now.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)