Blog

This man used the URL, which is like Coinbase- and is now facing a major lawsuit


Why did Coinbase sued a German man to “Coinbase.de?”

Coinbase, one of the most prominent cryptocurrencies in the world, sued Tobias Honscha, a German citizen, in an American federal court, accused of misuse of the name “Coinbase.de”.

The company claims that Honscha Participate in electronic nominationThe subsidiary rules of the program were violated and pose significant risks to hunting by operating e -mail services from the field.

The increasing threat to impersonate the domain

Perception of the domain It is a tactic where attackers record web sites that seem to be almost identical to the company’s official areas. They often use simple spelling changes and different field ends (such as “.”

These fake areas are usually used:

  • Harvesting entry login data via cloned login pages
  • Send deceptive emails that appear to be the official company’s contacts
  • Distribution of malware under the guise of legitimate applications or safety updates
  • Brand damage before Fraud users Those who believe they interact with the official company.

in CodedWhere the transactions are irreversible and are often unidentified, the impersonation of the field personality is particularly dangerous. One successful Hunting It can lead to a permanent financial loss of victims.

Why is this important for Coinbase and its users

The exchanges of encryption are billions of dollars in daily transactions, and the reputation of its brand depends on confidence and security. If users accidentally visit an informal field like “coinbase.de”, they may be unaware:

  • Share sensitive accreditation data or identity documents
  • Delegate fraudulent transactions
  • The victim of harmful programs designed for theft is located Special keys Or a conservative compromise.

For Coinbase, the loss of control over “Coinbase.de” constitutes both financial risks (possible hunting losses) and reputable risks (where users may link any fraud with Coinbase itself).

The issue highlights the importance of protecting the digital brand for cryptocurrencies and why the scope is still one of the most stable and addictive electronic threats in the encryption industry.

Is there “Coinbase.de”, and is it run by Coinbase?

Yes, “Coinbase.de” is a real field name, but it is not owned or run by Coinbase, the exchange of cryptocurrency in the United States. According to To the lawsuit, the field was registered and controlled by a German individual named Tobias Honscha.

Initially, it was claimed that the site re -directed visitors to the Coinbase platform for the use of a continued link, which generates a gunshi commissions while giving users the impression that it was an official field for Coinbase. After Coinbase ordered him to stop this activity, according to what was reported, the field began to redirect users to a non -related platform for material currency trading.

The lawsuit also claims that the email -related email service was “Coinbase.de”, which is a great risk. People with email messages from this field can easily make mistakes in official Coinbase Etisalat, which may lead to hunting attacks.

Therefore, while “coinbase.de” exists, it is not a legitimate location for currency step, and it should not be trusted in cryptocurrencies or access to the account. Coinbase services facing German from its main field, coinbase.com, which supports topical experiences without using third -party ranges.

Coinbase’s allegations against Honscha

Honscha vowed that Coinbase’s program using the “Coinbase.de” field to convert traffic through the affiliate links, misleading users, and run “@Coinbase.de” possible email accounts for hunting, and indicates Coinbase should buy the field to avoid these threats.

Violation of the subordinate program

Coinbase runs a follow -up program that drives user marks. Honscha used the “Coinbase.de” field to convert traffic through subsidiary links, giving users the impression that they were shared by Coinbase itself.

The company states that its dependent agreement prohibits:

  • Using the word “coinbase” or differences in the names of the field
  • deny As an official entity coinbase.

Distinctive excerpts of Coinbase's complaint, which indicates that the alleged violations of the ASFILIATE agreement

Email and hunting risk

After calling Coinbase Honscha to remove subsidiary links, he claimed that the field was to direct users to a platform for material currency trading. The most anxiety, Coinbase runs Honscha claims email accounts that end in “@Coinbase.de.”

This may mislead users, enable hunting attacks that include applications for counterfeit identity, reset the password and steal the authentication code (2FA).

Alleged coercion

The court files are implicitly said that Coinbase should buy the field to avoid hunting threats, which Coinbase describes as an attempt to pressure or “keep the root of the company.”

Do you know? In 2019, the fake “Myetherwallet” fields stole more than $ 150,000 in the ether (Eth) In just two hours using typographical techniques. These attacks remain one of the fastest forms of encrypted fading operations.

What is Cybersquateing?

Electronic transmission is the act of registration, smuggling, or using an identical or similar field name for the brand in force, with the intention of benefiting from it.

Typical motives It includes:

  • Selling the field to the brand holder at a bottom price
  • Using the field to mislead customers and lead dependent revenues or ads
  • Running the rahish clinic campaigns by exploiting the user’s confidence in a well -known brand.

Electronic transmission types

Consumer Protection Act Cyberquateing (ACPA)

In the United States, ACPA protects the owners of brands from bad religions. It is allowed:

  • The transfer of the court from the domains to the legal owners
  • Legal damage ranging from $ 1,000 to $ 100,000 per field of violation.

Why electronic transmission is worse in encryption

In encryption, electronic transmission is especially dangerous because:

  • Users often trust the existing websites only on known names.
  • Function attacks directly through the fields of fake exchange can lead to the theft of money and special keys.
  • Global operations mean the extensions of the translated field (such as “.”

Do you know? In 2001, Panavision filed a lawsuit against Cybersquatter, who registered “Panavision.com” and offered to sell it for $ 13,000. The case has become one of the first ACPA victories, proving how companies can restore the areas that are misused.

The risk of encryption for users and how to stay safe

The “coinbase.de” accident highlights the danger of similar ranges of cryptocurrencies. Attackers often simulate official exchange sites to mislead users and steal sensitive information.

The main risks must be encryptive users knowing

  • Hunting attacks: Fake fields and email addresses (for example, “Support@coinbase.de”) can deceive users to share the login approved data, ID documents or 2FA codes.
  • Accreditation theft: The fraudsters take the names of users and passwords through fake login pages, which allows unauthorized access to encryption portfolios or exchange accounts.
  • Permanent loss of money: Cleated currency transactions are irreversible. If you send money to a fraudulent portfolio address, the recovery will be almost impossible.
  • Email deception and fraud on identity: Email messages sent from a fake Coinbase like a legitimate and destructive confidence and lead to more advanced fraud.
  • The risk of malicious programs: Sometimes fake fields Harmful programs are disguised as encryption applications Or safety tools, affected devices and steal sensitive data.

How can users stay safe

  • Check URL addresses: Coinbase is the official site “Coinbase.com”. Avoid using additional letters, bonds, or ends of the country such as “.”
  • Reference on official websites: Always get to your exchange through reliable reference signals instead of clicking on the links in ads or messages.
  • Strong security empowerment: Use 2FA, preferably through the keys of devices instead of SMS.
  • Check for HTTPS certificates and safety certificates: Sharia coding sites use encrypted communications (search for “https: //” lock code).
  • Ignore suspicious emails: Do not click links or download attachments from unknown messengers claiming to be from Coinbase.
  • Download official applications only: Use check -up stores such as Google Play or Apple App Store; Avoid third -party download links.
  • Stay on the tricks: Follow the official Coinbase security updates and the news of the encryption industry to stay in view of the joint tactics and fraud.


publish_date

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button