This guide was created to inform users of the Thebitzone.com exchange about possible types of fraudulent actions.
1. "Deposit with fiat"
Thebitzone.com official does not provide a "Deposit with fiat"service. We will never require project participants and users to deposit cryptocurrency to any addresses.
2. Account information
Thebitzone.com support will not require anyone for any login information, payment password, Google authentication code, or private key in any name. Any requests of this nature are fraudulent.
3. Account/devices access
Never give access to your account and the funds stored on it to a third-party. Thebitzone.com will never request remote access to your account or your devices.
Phishing scammers can copy official e-mails on behalf of the Thebitzone.com exchange. Scammers may request confidential data via e-mail that compromises your account data, as well as your personal data that helps to identify you. Fraudsters can also attach links to change the phone number and password. Links of this nature may redirect you to a third-party fraudulent website or contain malware. Therefore, never click on links and do not give your data to third-parties.
Common types of phishing scam:
- Spear Phishing is based on personalized communication in order to gain the user's trust;
- Clone Phishing - copying a legitimate e-mail containing an attachment or link of a fraudulent version. The e-mail is sent from a masked address;
- Whaling - targeted at senior executives or senior people within the company. It usually looks like a legitimate concern, subpoena, client issue, or corporate matter;
- SMiShing - fraud using text or SMS. It looks like a confirmation of account activity.
Domain Keys Identified Mail (DKIM) technology allows a company to vouch for an e-mail message that is sent. Technically – this is a method of confirming the sender's domain through a cryptographic signature.
The Sender Policy Framework (SPF) technology is another way to identify the sender of an email and provides an additional option to filter the mail stream for spam messages.