Matrixport
Official Verification Channel
Website
Notice
Verify accounts through official Matrixport channel
Copy and paste (rather than manually type) links/addresses/IDs
Personal accounts of Matrixport staff/partners don't represent the company's official stance
Security & Education
Do not contact unofficial channels or share your account information, as this may lead to fraud. If you have any questions, please reach out to Customer Service. The following are basic security principles that take about 2 minutes to read. Please review them carefully and conduct a self-check based on these guidelines.
Maintain Privacy
There are many malicious actors in the market who will try every means to steal your cryptocurrency. Most attacks cast a wide net to catch inattentive or easily deceived users, and they may not necessarily target you specifically. However, if you accidentally disclose your private information, you could become a target.
Recommendations:
  • Avoid disclosing successful transactions
  • Don't reveal used addresses
  • Keep account balances confidential
  • Avoid sharing offline identity
  • Use encrypted communication channels
Use strong unique passwords and enable 2FA
Common Phishing Strategies
Phishing deceives users into disclosing information by masquerading as trusted entities. Identify suspicious URLs and urgent requests to enhance security awareness. Phishing relies on social engineering tactics, using spoofed emails to obtain victim information, commonly through malicious links and attachments.
  • Identify Phishing Attempts
  • Suspicious URLs
  • Public email addresses
  • Urgent/fear-based requests
  • Requests for personal information
  • Spelling/grammar errors
Phishing Types:
  • Clone Phishing: Copies legitimate emails with "updated" malicious links
  • Spear phishing: Attackers will research their targets in advance and launch precise attacks. They first collect the victim's information (such as names of friends or family members) and then use this data to trick the victim into visiting malicious websites.
  • Pharming: DNS record manipulation
  • Email scams: Criminals typically impersonate legitimate companies or individuals to send phishing emails. They use cleverly disguised login pages to collect victims' login credentials and personal identity information. These pages may contain trojans, keyloggers, and other malicious scripts designed to steal personal information.
  • Giveaway scams: Impersonate influential figures on social media. Phishers may pose as key executives of companies, posting giveaway advertisements or using other methods to carry out fraud.
Fake Apps
Only download applications from official app stores. Pirated or unofficial applications are not vetted and are more likely to contain cryptojacking scripts.
Scammers steal information through fake applications. Preventive measures include verifying the app's source, reading app reviews, and checking developer information and download counts.
Free giveaways and fake mining programs
Illegal mining programs degrade device performance. Fake mining software displays ads but doesn't actually mine. Stay vigilant and avoid using such applications.
Malicious applications alter copied cryptocurrency addresses
Such applications can modify the cryptocurrency address you copy, replacing it with an attacker’s fraudulent address. Although the victim copies the correct recipient address, the address is maliciously altered at the moment of pasting, causing funds to be sent to the attacker instead.
Public WiFi
Public WiFi requires precautions
Secure mobile devices - they're vulnerability points
Official Verification
Verify KOL statements through official channels
Crypto investing, made simple and accessible