Fraud schemes where attackers pretend to be someone else often involve impersonating known individuals, trusted individuals, exchanges, or services in order to trick users into sending them cryptocurrency or revealing personal information. We previously
mentioned this scheme, but now we will tell you in more detail.
Attackers can pose as well-known, influential personalities or trusted cryptocurrency platforms, creating fictitious profiles on social networks or instant messengers (we talked about how to recognize a fraudulent channel in Telegram
here). In this way, they interact with potential victims, gradually gaining their trust through convincing and promising arguments or false credentials. Once the victims give in, the scammers extract money or data from them and disappear.