At the end of the article, a crypto box awaits all readers!
Today, the methods involve direct interaction with people on the Internet. I emphasize that the information was collected in order to protect you from intruders; you cannot do what is written below!
Method number 1. Bank and SMS. The whole calculation in this method is on your laziness and inattention. Let's imagine that on some exchange you want to sell your tokens and receive rubles. You go to the p2p (person to person) section, create an advertisement for the sale of your tokens and select a bank among payment methods. The scammer responds to your ad, but in messages asks you to additionally send him your phone number, which is linked to the card, under some pretext, a limit, a desire to transfer through SBP, any nonsense. You, without suspecting anything, leave your phone number and receive a push notification about the amount you have received. The amount is correct, everything is correct and you transfer your tokens to the attacker. The mistake was that you did not look at your card balance. The fraudster simply wrote you an SMS in the bank chat about the transfer of funds, and you, inadvertently, considered this message to be real.
How to avoid getting caught?
Always check your card balance and transfer history in the bank app, even if you gave someone an additional phone number.
Method #2. Periods and commas. The whole insidiousness of this method is that you can be very attentive, but the human factor can one day play a cruel joke. This method can also be used with p2p. Let's imagine that you should receive 12 thousand 256 USDT. How is this amount recorded? 12256? 12,256? 12.256? In the USA, it is customary to separate the fractional part of a number from an integer with a dot, and every 3 digits of a number with a comma. It turns out that 12.256 is 12 thousand 256 dollars, and 12.256 is 12 dollars and 25 cents. Scammers take advantage of this and, instead of the required amount, can give you a thousand times less money.
Carefully check the amount credited to your account.
Method #3. Triangle. It is simply necessary to know about this method; it is essentially not from the world of cryptocurrencies, but it is used there too. There are 3 sides to this method. You are a victim, a scammer and an exchanger service. Exchangers are actively fighting this method of scam, but, for example, it’s easy to buy TON in telegram this way, there is no protection, so I’ll explain it using his example. Let's say you want to buy 10 TON from someone, you agree on the purchase in a correspondence and they send you payment details, phone number or card number. You think that if they wanted to deceive you, they would not give information that could easily be used to find the person. You send money, write that you have paid for everything and end up on the blacklist. The essence of the method is that the fraudster went to p2p in the TON wallet, agreed to the transaction, received the TON seller’s card details and sent them to you. The seller saw that he had received money and, without suspecting anything, threw the tokens to the scammer. In this situation, 2 people suffer at once, both the seller and you, because if something happens, they will find the seller and suspicions of fraud will fall on him.