Your Common Scams Cheat Sheet

Your Common Scams Cheat Sheet

Spread the love

Have you ever received a scam phone call or message? Crypto scams are on the rise and the tactics used are getting more and more sophisticated.

The Blockchain.com Security team has put together a cheat sheet to help you recognize the telltale signs of fraud and avoid risking your account or funds.

Stay extra cautious on email

Email is one of the most common ways that a hacker can access your account. Always double check the sender email address before clicking on any links or attachments.

We will never contact you from any other email address other than our official verified contact details.

Top tip: Verify an email sender

Sometimes fraudsters can mask their actual email addresses to look like one of ours. To verify the actual email address that you are in contact with, check the email’s headers..

Here’s how to find email headers:

Use official Blockchain.com apps

Download our Blockchain.com mobile apps from the official store pages only.

Blockchain.com Wallet

Blockchain.com Exchange:

Be wary of fake social media accounts

We often see fake Blockchain.com social media accounts being created, make sure you follow and interact with our official pages only.

Recognize the tactics

New tactics are being developed all the time but some of the most common scams that our customers have faced are detailed below:

Now that you’re aware of the signs, make sure to take the protective measures to secure your account. Here’s our three must-do steps:

  1. Never share your Secret Private Key Recovery Phrase (also called a backup seed), your Private Key, your password, or your Wallet ID with anyone.
  2. Set up Two-Factor Authentication (2FA) as an extra layer of security on your account.
  3. If you have any doubt, open a Support Center Ticket here to confirm the validity of a request.

Related News

pantera-capital-seeks-$1b-for-a-new-crypto-fund:-report
avail-integrates-leading-layer-2-networks-to-create-more-cost-efficient-chains
how-blockchain-based-voting-can-restore-trust-in-the-electoral-process