Avoid Scammers Pretending to be Crowd1

We have been reported that phishing posts and emails are being spread. Remember that Crowd1 will never ask for your log-in information and will never ask you to log in to any site that is not www.crowd1.com.

If you have been a victim to this scheme, or have received any other malicious emails or messages regarding Crowd1, please contact support via your back office so that we may follow up on the issue.

Keep reading to learn how to recognize Phishing and how to avoid it.


What is Phishing?

Phishing is a type of cybercrime used to steal personal information from users, such as login credentials and credit card details. Someone posing as a respectable organization contacts the target or targets by email, phone, or text message in order to persuade them to provide sensitive data.


Common features

  1. Too Good To Be True - Phishers may use techniques that are eye catching in order to steal your immediate attention and easier lure you over. If someone is offering you an iPhone or claims that you have inherited a large amount of money from an unknown relative, it is probably a scam. A general rule of thumb is that if anything seems too good to be true; it probably is!
  1. Sense of Urgency - Most cyber criminals tend to write emails that tell you to act fast since the deal is only available for a limited time. In some cases they may tell you that you only have a few minutes. They may tell you that your account will be deleted unless you update your personal information. Most professional and reliable businesses always give customers time before an account is terminated. They will never ask customers to update personal details over the internet. If you are unsure, visit the company's own website instead of clicking on a suspicious link.
  1. Hyperlinks - A link may not be all it appears to be. Hovering over a link shows you the actual URL where you will be directed upon clicking on it. It could be completely different or it could be a popular website with a misspelling, for example  “Crovd1” with a V instead of a W.
  1. Attachments - If you have received an attachment in a suspicious and unexpected email, never open it. These attachments can contain harmful viruses.
  1. Unusual Sender- If an email you have received seems out of the ordinary and out of character never open it. It doesn’t matter if the email looks like it’s from someone you don't know or even someone you know; ignore and delete it.