quora
Explore More

Shufti globally launches webinr-icon - a new kind of identity solution!

Shufti globally launches - a new kind of identity solution!

Read more

Cryptocurrency Scams – Checklist for Protection

How to Avoid Cryptocurrency Scams

Headlines about some cryptocurrency exchange being hacked are not unusual. So far, hackers have stolen over 1 million bitcoins BTC from different exchanges. Despite financial regulatory checks, scammers come up with innovative schemes. This article looks at the top five ways how cryptocurrency scams work and how to avoid them.

1. Fake ICOs – Pump and Dump Coins

Initial coin offerings (ICOs) that ‘dump’ once they have attracted enough investment, are the most prevalent frauds. Such coins usually have no utility but lots of promises.

2. Phone Porting

In phone porting, scammers steal identity of the victim. Then, they call the phone service provider to transfer the number to another provider. Finally, they log the victim out of his own accounts (banks, exchanges, e-wallets etc.). The victim may try to reset passwords but the two step verification would not reach his phone.

3. Online Wallets or Centralised Exchange

Hackers love it when investors store cryptocurrencies in an online wallet. It makes the treasure susceptible to hacking attacks. Such breaches are quite a sophisticated. Even large cryptocurrency exchanges are vulnerable to these attacks.

4. Ponzi schemes

An ICO venture that feeds money to the earliest investors from the money of new investors is a Ponzi scheme. Coins that guarantee return are usually Ponzi cryptocurrency scams.

5. Shady Exchanges

A huge number of cryptocurrency exchanges do not uphold KYC and AML compliance. So, Which cryptocurrency exchange to trust? Plenty of dodgy exchanges are mushrooming. And many put up an online presence that look credible on the surface. Yet, a deeper evaluation reveals that they have ‘set up’ this persona to steal money from investors.

How to Avoid Cryptocurrency Scams

  • Institutes approving ICOs should run thorough background checks on the people launching coin. Anonymity in the wrong hands can be devastating. Screening ICO initiators can thwart scammers.
  • On the flip side, the exchanges that enlist coins can also run these background checks. Following KYC compliance also deters double-dealers.
  • Safety first! Investors should do their due diligence and use safe methods to store coins. They should also be realistic when evaluating an ICO. A coin promising to make money from sunshine is an obvious red flag.   

Cryptocurrency scams cannot be completely eradicated. But by integrating background checks and vigilance they become easier to spot. Investors cannot be greedy or careless. Only trade through credible cryptocurrency exchanges.

The onus also lies on the government and financial regulators. Only legitimate ICOs should be able to do business on exchanges. 

Related Posts

Blog

Leveling Up Identity Verification To Meet This Moment

Evolution has always been a defining trait of the identity verification space. The COVID-19 pande...

Leveling Up Identity Verification To Meet This Moment Read More

Blog

A Fintech’s Journey to 100% Compliance and Rapid Growth

Read on to learn about the keys to My EU Pay’s success. Staying Competitive as a Fintech Founded ...

A Fintech’s Journey to 100% Compliance and Rapid Growth Read More

Blog

Identity Verification Isn’t Just for Compliance Anymore

As the article indicates, that fight involves identity verification becoming a mainstream phenome...

Identity Verification Isn’t Just for Compliance Anymore Read More

Blog

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud

Decoding the 2023 Fraud Landscape | Analyzing Shufti’s Millio...

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud Read More

Blog

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024

Video KYC (VKYC) is a method of verifying the identity of an individual or entity by leveraging v...

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024 Read More

Blog

A 2024 Overview of Identity Document Forgery

What is Document Forgery: The Common Types  Identity document forgery is a serious crime that can...

A 2024 Overview of Identity Document Forgery Read More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

The acronym Politically Exposed Persons [PEPs] first emerged in the 1990s, known as Senior Foreig...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Read More

Blog

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification

In general, identity proofing and identity verification are essentially the same processes, as th...

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification Read More

Blog

Leveling Up Identity Verification To Meet This Moment

Evolution has always been a defining trait of the identity verification space. The COVID-19 pande...

Leveling Up Identity Verification To Meet This Moment Read More

Blog

A Fintech’s Journey to 100% Compliance and Rapid Growth

Read on to learn about the keys to My EU Pay’s success. Staying Competitive as a Fintech Founded ...

A Fintech’s Journey to 100% Compliance and Rapid Growth Read More

Blog

Identity Verification Isn’t Just for Compliance Anymore

As the article indicates, that fight involves identity verification becoming a mainstream phenome...

Identity Verification Isn’t Just for Compliance Anymore Read More

Blog

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud

Decoding the 2023 Fraud Landscape | Analyzing Shufti’s Millio...

The State of Fraud Detection & Prevention in 2024 | Ready, Set, Fraud Read More

Blog

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024

Video KYC (VKYC) is a method of verifying the identity of an individual or entity by leveraging v...

Revolutionizing the Finance Sector | VKYC’s Impact on Identity Verification in 2024 Read More

Blog

A 2024 Overview of Identity Document Forgery

What is Document Forgery: The Common Types  Identity document forgery is a serious crime that can...

A 2024 Overview of Identity Document Forgery Read More

Blog

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs]

The acronym Politically Exposed Persons [PEPs] first emerged in the 1990s, known as Senior Foreig...

Harnessing the power of AML Screenings to Uncover Politically Exposed Persons [PEPs] Read More

Blog

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification

In general, identity proofing and identity verification are essentially the same processes, as th...

Elevated Business Security: A Comparative Analysis of Identity Proofing and Identity Verification Read More

Take the next steps to better security.

Contact us

Get in touch with our experts. We'll help you find the perfect solution for your compliance and security needs.

Contact us

Request demo

Get free access to our platform and try our products today.

Get started