An Introduction to Cryptocurrency Investing & Trading
The Importance of Security
Buying & Selling Cryptocurrency
Storing Cryptocurrency
Sending Cryptocurrency

What Is Phishing?

Phishing is a cyber attack method designed to steal user data, such as login credentials and credit card numbers. It can be done through telephone or text messaging, but most commonly will be in the form of email.

Often phishing hackers will try to make you think you’re on an official website—when really it is just a fake website that is disguised to match the look and feel of the legitimate site.

The goal is to trick you into thinking the message is from a trusted source. This might be from the government, your bank or credit card company. In crypto, they could pose as a member of an exchange or project.

What to Look Out For?

  1. Is this too good to be true? Are the emails claiming you have won a new laptop or bitcoin? If so, there is a clear red flag you are a victim of a phishing scam.
  2. Check the spelling of the senders domain URL: Often phishing scams will have a URL which looks different to the official website. This could be different letters or numbers in the URL or have a slight misspelling.
  3. Style of the email: Does the formatting look suspicious, and if it is from a company you have received emails in the past, does it have a different format than usual? Sometimes logos might look different or the email is poorly written, which can be a sign of a malicious email.
  4. Sense of urgency: Do they pressure you by giving you a short amount of time to claim a prize before it expires? This is not how normal businesses operate and will always give you plenty of warnings before they take action.
  5. Unusual sender: Have you received emails or calls from this person before?
  6. Posing as a trusted source: Phishing scams will often pose a trusted course, such as your bank or a government worker.
  7. Message is sent from a public email domain Most organisations will have their own email domain or company accounts. Apart from some smaller companies, it will be rare to see official emails from a company end in ‘@gmail.com’ for example.
  8. It includes suspicious links or attachments Phishing emails or messages will always have an infected attachment that you are asked to download or click on.
rz48xg41op661
An example of a Ledger phishing scam. This phishing alert sends you to a fake website that asks you the 24 words of your recovery phrase.

Steps to Minimise Falling For a Phishing Scam

  1. If you receive a suspicious email from someone you know, do not reply to the email but contact the source directly to verify.
  2. Limit personal data available on your social media—such as birthday, address or phone number.
  3. Sometimes you can hover over the link—to see the URL. Be extremely careful not to accidentally click the link.
  4. Always use antivirus and malware protection.
  5. Check the subject, sender and email address.
  6. Avoid replying to fraudulent messages.
  7. Ensure you always use a secure website when entering sensitive information by checking your browser begins with “https://” not “http://” and look for the small padlock somewhere close to the address.
  8. When in doubt contact the company directly through their official website.