How Blockchain Professionals Can Avoid Phishing and Employment Scams. Report and Catch.
How Blockchain Professionals Can Avoid Phishing and Employment Scams
The rise of blockchain technology has attracted both innovative professionals and malicious scammers looking to exploit the industry. Phishing and employment scams are particularly prevalent, posing significant risks to blockchain professionals. This article provides detailed instructions on how to avoid these scams, offering practical advice, reporting systems, and the steps necessary to protect yourself and your organization.
Understanding the Threat
Phishing scams involve fraudulent attempts to obtain sensitive information by impersonating reputable entities. Employment scams, on the other hand, trick job seekers into providing personal information or paying for fake job offers. Both types of scams can have devastating consequences, including identity theft, financial loss, and reputational damage.
Step-by-Step Instructions to Combat Scammers
1. Identify and Avoid Phishing Scams
A. Recognize Phishing Emails
- Check the Sender’s Email Address: Look for slight misspellings or variations in the email domain.
- Examine the Content: Be wary of urgent requests, suspicious attachments, and links.
- Verify with the Source: Contact the company directly using verified contact information to confirm the legitimacy of the email.
B. Use Security Tools
- Install Anti-Phishing Software: Use tools like Norton or McAfee to filter out phishing emails.
- Enable Two-Factor Authentication (2FA): Protect your accounts with an additional layer of security.
C. Stay Informed
- Participate in Training: Regularly attend cybersecurity training sessions.
- Stay Updated: Follow cybersecurity news to learn about the latest phishing tactics.
2. Avoid Employment Scams
A. Verify Job Offers
- Research the Company: Look up the company’s website, reviews, and contact information.
- Check Email Domains: Legitimate companies typically use their official domains for communication.
- Ask for Details: Request detailed job descriptions and verify the legitimacy through official company channels.
B. Be Wary of Red Flags
- Upfront Payments: Legitimate employers do not ask for money for training or application processes.
- Too Good to Be True: Be skeptical of job offers that promise high salaries with minimal effort.
- Use of Telegram: Scammers may attempt to connect via Telegram after finding your contact information. Be cautious if they ask you to click on links or download files.
- Executable Files: Never download or run executable files (.exe) from unverified sources. Scammers may ask you to install a video chat application that is actually malware designed to gain access to your computer and passwords.
C. Use Trusted Platforms
- Apply Through Official Channels: Use the company’s official website or recognized job portals.
- Verify Recruiters on LinkedIn: Check the recruiter’s profile, connections, and activity for authenticity.
Reporting Systems and How to Use Them
1. Google
- Report Phishing Emails: Use the “Report phishing” option in Gmail to alert Google about suspicious emails.
- Step-by-Step:
- Open the phishing email.
- Click on the three vertical dots in the top-right corner.
- Select “Report phishing.”
2. LinkedIn
- Report Suspicious Messages or Profiles:
- Step-by-Step:
- Go to the suspicious message or profile.
- Click on the “More” button (three dots).
- Select “Report” and follow the instructions.
3. Twitter
- Report Scam Tweets or Accounts:
- Step-by-Step:
- Click on the three dots icon on the tweet or profile.
- Select “Report Tweet” or “Report Account.”
- Choose “It’s suspicious or spam” and follow the prompts.
4. IC3 (Internet Crime Complaint Center)
- File a Complaint:
- Step-by-Step:
- Visit https://www.ic3.gov/.
- Click on “File a Complaint.”
- Fill out the complaint form with detailed information about the scam.
5. INTERPOL
- Report Cybercrime:
- Step-by-Step:
- Visit the INTERPOL website: https://www.interpol.int/en/Crimes/Cybercrime.
- Use the provided contact information to report cybercrime to your local authorities who will coordinate with INTERPOL.
5. Canadian RCMP
- Visit the Canadian RCMP website:
https://www.services.rcmp-grc.gc.ca/CAFCFRS/ - Use the provided contact information to report cybercrime to your local authorities who will coordinate with INTERPOL.
Reporting Systems in Hong Kong
1. Hong Kong Police Force
- Report Cybercrime and Scams:
- Step-by-Step:
- Visit the Hong Kong Police Force e-Report Centre: https://www.erc.police.gov.hk/cmiserc/CCC/PolicePublicPage?language=en.
- Follow the instructions to file a report online.
2. HKCERT (Hong Kong Computer Emergency Response Team Coordination Centre)
- Report Cybersecurity Incidents:
- Contact Information:
- Email: report@hkcert.org
- Phone: +852 8105 6060
- Website: https://www.hkcert.org/report
3. Office of the Communications Authority (OFCA)
- Report Internet Safety Issues:
- Contact Information:
- Email: enquiry@ofca.gov.hk
- Phone: +852 2961 6333
- Website: https://www.ofca.gov.hk/en/contact_us/index.html
Reporting Systems in Mainland China
1. China Internet Network Information Center (CNNIC)
- Report Cybersecurity Incidents:
- Contact Information:
- Email: service@cert.org.cn
- Phone: +86 10 5881 2985
- Website: http://www.cert.org.cn/
2. The Ministry of Public Security (MPS)
- Report Cybercrime:
- Contact Information:
- Email: internetpolice@mps.gov.cn
- Phone: +86 10 6626 2114
- Website: http://www.cyberpolice.cn/wfjb/
3. China Anti-Fraud Center
- Report Fraud Cases:
- Hotline: +86 110 (emergency number for reporting fraud)
- Website: https://www.12377.cn/ (for reporting internet fraud)
Additional Tips to Protect Yourself
- Use Strong Passwords: Regularly update passwords and use a combination of letters, numbers, and special characters.
- Regular Backups: Frequently back up your data to prevent loss in case of a cyber attack.
- Educate Your Network: Share information about scams with colleagues and peers to raise awareness.
For CEOs and Leadership of Legitimate Blockchain Startups
As a CEO or leader in the blockchain industry, it’s imperative to take proactive steps to safeguard your organization and employees against these scams. Here are some critical actions to take:
1. Implement Comprehensive Training Programs
- Regular Cybersecurity Training: Ensure all employees undergo regular training on how to recognize and respond to phishing and employment scams.
- Simulated Phishing Attacks: Conduct regular phishing simulations to test and improve employees’ readiness.
2. Establish Clear Policies and Procedures
- Incident Reporting: Create a straightforward process for employees to report suspicious activities or potential scams.
- Verification Protocols: Implement strict protocols for verifying job offers and communication from recruiters.
3. Communicate the Risks
- Regular Updates: Send regular updates about emerging threats and best practices for avoiding scams.
- Encourage Vigilance: Foster a culture of vigilance and encourage employees to question and verify unexpected communications.
4. Use Advanced Security Measures
- Enhanced Email Security: Deploy advanced email security solutions that filter out phishing attempts and malicious content.
- Network Security: Ensure robust network security measures are in place to detect and prevent unauthorized access.
Conclusion
Scammers are becoming increasingly sophisticated, but by following these detailed steps, blockchain professionals can protect themselves from phishing and employment scams. Reporting these scams to appropriate authorities not only helps you but also aids in combating these crimes globally. Remember, vigilance and prompt action are key to staying safe in the digital world.
To any scammers reading this: know that we are watching. This article comes from a confidential informant for the FBI, SEC, and Ontario Provincial Police. We are committed to exposing and stopping your malicious activities. Authorities have advanced tracing techniques and investigative capabilities. For instance, in the high-profile case of Michael Terpin, who lost $23 million in a crypto scam, law enforcement successfully identified and pursued the perpetrators using sophisticated tracking methods. Terpin’s case, involving the so-called “Baby Al Capone” Ellis Pinsky, demonstrates that even the most cunning criminals can be brought to justice. Read more about it on Bloomberg: https://www.bloomberg.com/news/newsletters/2022-12-07/when-crypto-scammers-stole-23-million-this-victim-found-them and the New York Post: https://nypost.com/2020/05/23/baby-al-capone-ellis-pinsky-pulled-off-a-23-8-million-crypto-heist/. Your days of exploiting innocent professionals are numbered.
Sources:
- Google Safety Center: https://safety.google/
- LinkedIn Help: https://www.linkedin.com/help/linkedin/ask/TS-N-ATS
- Twitter Help Center: https://help.twitter.com/
- IC3: https://www.ic3.gov/
- INTERPOL Cybercrime: https://www.interpol.int/en/Crimes/Cybercrime
- Hong Kong Police Force e-Report Centre: https://www.erc.police.gov.hk/cmiserc/CCC/PolicePublicPage?language=en
- HKCERT: https://www.hkcert.org/report
- OFCA: https://www.ofca.gov.hk/en/contact_us/index.html
- China Internet Network Information Center (CNNIC): http://www.cert.org.cn/
- Ministry of Public Security (MPS): http://www.cyberpolice.cn/wfjb/
- China Anti-Fraud Center: https://www.12377.cn/