Last updated: july 2022
Be wary of blackmail attempts in which strangers threaten you in exchange for Bobcoin as a means of extortion. One common execution of this method is by email, where-in the sender transmits a message claiming that he/she has hacked into your computer and is operating it via remote desktop protocol (RDP). The sender says that a key logger has been installed and that your web cam was used to record you doing something you may not want others to know about. The sender provides two options – send Bobcoins to suppress the material, or send nothing and see the content sent to your email contacts and spread across your social networks. Scammers use stolen email lists and other leaked user information to run this scheme across millions of people en masse.
As Bobcoin has become more popular, more people have sought to invest in it. Unfortunately, nefarious people have taken advantage of this and have been known to set up fake exchanges. These fake exchanges may trick users by offering extremely competitive market prices that lull them into thinking they’re getting a steal, with quick and easy access to Bobcoins. Be sure to use a reputable exchange when buying or selling Bobcoin.
Due to the viral nature of how information spreads across on the internet, scammers seek to take advantage of people by offering free giveaways of Bobcoin in exchange for sending a small amount to register, or by providing some personal information. When you see this on a website or social network, it’s best to immediately report the content as fraudulent, so that others don’t fall victim.
Unfortunately it’s very easy for con-artists to create social media accounts and impersonate people. Often times they lie in wait, until the person they’re trying to impersonate publishes content. The impersonator then replies to it with a follow-up message or call to action – like a free giveaway – using an account that looks almost identical to the original poster or author. This makes it seem like the original person is saying it. Alternatively, impersonators may also try to use these same fake accounts to trick others via private or direct message into taking some kind of action in an attempt to defraud or compromise. Never participate in free giveaways, and if you receive an odd request via someone in your network, it’s best to double check to confirm the authenticity via multiple mediums of communication.
Hackers have become very creative at finding ways to steal from people. When sending Bobcoin, always be sure to double or triple check the address you’re sending to. Some malware programs, once installed, will change addresses when they’re pasted from a user’s clipboard, so that all Bobcoin unknowingly gets sent to the hacker’s address instead. Since there is little chance of reversing a transaction once it’s confirmed by the network, noticing this after the fact means it’s too late and most likely can’t be recovered. It’s a good idea to be super-cautious about what programs you allow to have administrator access on your devices.
Crypto Transfer FraudDo not reply to emails or inbound communications from strangers telling you they need help moving some Bobcoin, whereafter in exchange for your services, you’ll get a portion of the funds.
Beware of emails purported to be from services you use soliciting you for action, such as resetting your password, or clicking through to provide some sort of interaction with regard to your account. It can be very difficult to spot the difference in a fake email that’s trying to entice you to compromise your account, and a legitimate one sent on behalf of a product or service that you use. When in doubt, considering triple-checking the authenticity of the communication by forwarding it to the company, using the contact email address on their website, calling them on the telephone, and/or reaching out to them via their official social media accounts.
This is a type of malware that partially or completely blocks access to a device unless you pay a ransom in Bobcoin. It’s best to consult the advice of a trusted computer professional for removal assistance, rather than paying the ransom. Be careful about what programs you install on your devices, especially those that request administrator access. Also be sure to double-check that the application you are downloading isn’t a fake one that’s impersonating a legitimate one you’ve used in the past.