Brokeree Solutions Warns on Fake Skype Account Impersonating Them
- The Estonia-based technology solutions provider noted that scammers are asking for Bitcoin payments via Skype.

In fact, the impersonators discuss all the details of the inexistent contract via Skype, although they decline any calls and meetings requests made by the scheme’s victims. The software provider warned that it has an official Skype username, ‘brokeree’, and only accepts payments via bank transfer in USD or EUR. Moreover, Brokeree Solutions noted that contracts are negotiated and discussed only through email and not via Skype.
Employees are allowed to only use corporate emails from the provider’s official domain email, while private meetings and presentations are arranged through its sales email. Moreover, the company pointed out that its official phone number is available for calls only during business hours and encouraged people to report any suspicions on people impersonating them via official channels.
Other Impersonation Cases
Recently, as Finance Magnates reported, HIVE Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term Technologies issued a warning on several impersonators pretending to be them and are allegedly involved in fraud. Some people have already been affected by the matter and have reportedly lost money because of the scammers.
The blockchain firm published a series of screenshots that have unveiled how these fake sites are sophistically copying HIVE’s content to catch victims and make it appear legit. For example, in one of the bogus websites, the scammers noted that “this company practice advanced trading and return good profit to members,” implying that it is involved in investment fraud schemes.
In another case, the Cyprus Securities and Exchange Commission (CySEC) issued a warning in August about a fake website impersonating them which was hosted in India.
In fact, the impersonators discuss all the details of the inexistent contract via Skype, although they decline any calls and meetings requests made by the scheme’s victims. The software provider warned that it has an official Skype username, ‘brokeree’, and only accepts payments via bank transfer in USD or EUR. Moreover, Brokeree Solutions noted that contracts are negotiated and discussed only through email and not via Skype.
Employees are allowed to only use corporate emails from the provider’s official domain email, while private meetings and presentations are arranged through its sales email. Moreover, the company pointed out that its official phone number is available for calls only during business hours and encouraged people to report any suspicions on people impersonating them via official channels.
Other Impersonation Cases
Recently, as Finance Magnates reported, HIVE Blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term Technologies issued a warning on several impersonators pretending to be them and are allegedly involved in fraud. Some people have already been affected by the matter and have reportedly lost money because of the scammers.
The blockchain firm published a series of screenshots that have unveiled how these fake sites are sophistically copying HIVE’s content to catch victims and make it appear legit. For example, in one of the bogus websites, the scammers noted that “this company practice advanced trading and return good profit to members,” implying that it is involved in investment fraud schemes.
In another case, the Cyprus Securities and Exchange Commission (CySEC) issued a warning in August about a fake website impersonating them which was hosted in India.