When attacked by a miner virus, a Trojan horse will be transferred onto your mining machine. This allows the attacker to take control of your device and steal hashrate. Typical symptoms of an attack include: Ways to Avoid Miner Viruses: Antivirus Removal Method:
Category: Safety & Security
What is a phishing account and how can I avoid being a victim of one?
Phishing attacks are a tactic used by scammers to first steal one’s personal information and after that, the funds of their victims. Fraudsters may try to fake being or being a representative of PEGA-Pool using malicious links or computer software to attempt to steal your account username, password and other sensitive information. Once they have […]
My account has been hacked. What should I do?
Should your account be backed, immediately stop mining on your old account and open a new account. Be sure to change the passwords on both your PEGA-Pool and email accounts. To prevent this from happening, we strongly recommend that you setup two-factor authentication (2FA). It is also wise to avoid using the same password for […]
A PEGA-Pool agent offered me an investment opportunity. Is it a scam?
PEGA-Pool does not solicit investments from our miners! If you have received any type of investment opportunity from anyone claiming to be affiliated with PEGA-Pool, consider it a scam. Do feel free to contact us to report any phishing attempts or to verify that any social media messages or emails you have received are in […]